CVE-2023-28859

EUVD-2023-0223
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 58%
Affected Products (NVD)
VendorProductVersion
redisredis-py
4.2.0 ≤
𝑥
< 4.4.4
redisredis-py
4.5.0 ≤
𝑥
< 4.5.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-redis
bookworm
4.3.4-3
fixed
bullseye
3.5.3-2
fixed
sid
4.3.4-4
fixed
trixie
4.3.4-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-redis
bionic
not-affected
focal
not-affected
jammy
not-affected
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needed
oracular
needed
trusty
ignored
xenial
not-affected