Off-by-one Error Affecting python-redis package, versions *


Severity

Recommended
0.0
low
0
10

Based on Debian security rating.

Threat Intelligence

EPSS
1.74% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-PYTHONREDIS-5296020
  • published30 Mar 2023
  • disclosed26 Mar 2023

Introduced: 26 Mar 2023

CVE-2023-28858  (opens in a new tab)
CWE-193  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 python-redis.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-redis package and not the python-redis package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.

CVSS Base Scores

version 3.1