CVE-2023-28859: redis-py Race Condition due to incomplete fix
(updated )
redis-py through 4.5.3 and 4.4.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
References
- github.com/advisories/GHSA-8fww-64cx-x8p5
- github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml
- github.com/redis/redis-py
- github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965
- github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb
- github.com/redis/redis-py/issues/2665
- github.com/redis/redis-py/pull/1899
- github.com/redis/redis-py/pull/2641
- github.com/redis/redis-py/pull/2666
- github.com/redis/redis-py/pull/2671
- github.com/redis/redis-py/releases/tag/v4.4.4
- github.com/redis/redis-py/releases/tag/v4.5.4
- nvd.nist.gov/vuln/detail/CVE-2023-28859
Detect and mitigate CVE-2023-28859 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →