CVE-2023-28859

redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
VendorProductVersion
redisredis-py
4.2.0 ≤
𝑥
< 4.4.4
redisredis-py
4.5.0 ≤
𝑥
< 4.5.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-redis
bullseye
3.5.3-2
fixed
bookworm
4.3.4-3
fixed
trixie
4.3.4-4
fixed
sid
4.3.4-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-redis
oracular
needed
noble
needed
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
ignored