CVE-2023-28858

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
redisredis-py
4.2.0 ≤
𝑥
< 4.3.6
redisredis-py
4.4.0 ≤
𝑥
< 4.4.3
redisredis-py
4.5.0 ≤
𝑥
< 4.5.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-redis
bullseye
3.5.3-2
not-affected
bookworm
postponed
buster
not-affected
trixie
vulnerable
sid
vulnerable
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-redis
oracular
needed
noble
needed
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
ignored