Bug 2182058 (CVE-2023-28859) - CVE-2023-28859 redis: Async command information disclosure
Summary: CVE-2023-28859 redis: Async command information disclosure
Keywords:
Status: NEW
Alias: CVE-2023-28859
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2183503 2221860
Blocks: 2182047
TreeView+ depends on / blocked
 
Reported: 2023-03-27 12:37 UTC by Avinash Hanwate
Modified: 2023-07-12 10:28 UTC (History)
28 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Redis redis-py. This flaw allows a remote, authenticated attacker to obtain sensitive information caused by an issue with leaving a connection open after canceling an async Redis command at an inopportune time. By sending a specially crafted request, an attacker can obtain sensitive information and use this information to launch further attacks against the affected system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-03-27 12:37:40 UTC
redis-py through 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.

https://github.com/redis/redis-py/pull/2641
https://github.com/redis/redis-py/issues/2665

Comment 4 Avinash Hanwate 2023-07-11 06:08:26 UTC
Created pymodbus tracking bugs for this issue:

Affects: fedora-all [bug 2221860]


Note You need to log in before you can comment on or make changes to this bug.