GHSA-24wv-mv5m-xv4h

Suggest an improvement
Source
https://github.com/advisories/GHSA-24wv-mv5m-xv4h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-24wv-mv5m-xv4h/GHSA-24wv-mv5m-xv4h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-24wv-mv5m-xv4h
Aliases
Published
2023-03-26T21:30:23Z
Modified
2024-10-25T21:54:11.332865Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
redis-py Race Condition vulnerability
Details

redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but are believed to be incomplete. CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.

References

Affected packages

PyPI / redis

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.4.0
Fixed
4.4.3

Affected versions

4.*

4.4.0
4.4.1
4.4.2

PyPI / redis

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.5.0
Fixed
4.5.3

Affected versions

4.*

4.5.0
4.5.1
4.5.2

PyPI / redis

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
4.3.6

Affected versions

4.*

4.2.0
4.2.1
4.2.2
4.3.0
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5