CVE-2023-28858: redis-py Race Condition vulnerability
(updated )
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3; however, CVE-2023-28859 is a separate vulnerability.
References
- github.com/advisories/GHSA-24wv-mv5m-xv4h
- github.com/redis/redis-py/compare/v4.3.5...v4.3.6
- github.com/redis/redis-py/compare/v4.4.2...v4.4.3
- github.com/redis/redis-py/compare/v4.5.2...v4.5.3
- github.com/redis/redis-py/issues/2624
- github.com/redis/redis-py/pull/2641
- nvd.nist.gov/vuln/detail/CVE-2023-28858
- openai.com/blog/march-20-chatgpt-outage
Detect and mitigate CVE-2023-28858 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →