Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28858
HistoryMar 26, 2023 - 12:00 a.m.

CVE-2023-28858

2023-03-2600:00:00
ubuntu.com
ubuntu.com
19
cve-2023-28858
security vulnerability
redis-py
connection open
async
off-by-one
data leakage
chatgpt
bug
debian
mdeslaur
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.7%

redis-py before 4.5.3 leaves a connection open after canceling an async
Redis command at an inopportune time, and can send response data to the
client of an unrelated request in an off-by-one manner. NOTE: this CVE
Record was initially created in response to reports about ChatGPT, and
4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline
operations); however, please see CVE-2023-28859 about addressing data
leakage across AsyncIO connections in general.

Bugs

Notes

Author Note
mdeslaur async support added in 4.2.0
OSVersionArchitecturePackageVersionFilename
ubuntu23.10noarchpython-redis< anyUNKNOWN
ubuntu24.04noarchpython-redis< anyUNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.7%