CVE-2023-28858: redis-py Race Condition vulnerability
(updated )
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but are believed to be incomplete. CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.
References
- github.com/advisories/GHSA-24wv-mv5m-xv4h
- github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml
- github.com/redis/redis-py
- github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283
- github.com/redis/redis-py/compare/v4.3.5...v4.3.6
- github.com/redis/redis-py/compare/v4.4.2...v4.4.3
- github.com/redis/redis-py/compare/v4.5.2...v4.5.3
- github.com/redis/redis-py/issues/2624
- github.com/redis/redis-py/pull/2641
- github.com/redis/redis-py/releases/tag/v4.4.4
- github.com/redis/redis-py/releases/tag/v4.5.4
- nvd.nist.gov/vuln/detail/CVE-2023-28858
- openai.com/blog/march-20-chatgpt-outage
Detect and mitigate CVE-2023-28858 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →