Bug 2182057 (CVE-2023-28858) - CVE-2023-28858 redis: Async command information disclosure
Summary: CVE-2023-28858 redis: Async command information disclosure
Status: NEW
Alias: CVE-2023-28858
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Nobody
QA Contact:
Depends On: 2183502 2221861
Blocks: 2182047
TreeView+ depends on / blocked
Reported: 2023-03-27 12:32 UTC by Avinash Hanwate
Modified: 2023-07-12 10:28 UTC (History)
28 users (show)

Fixed In Version: redis 4.3.6, redis 4.4.3, redis 4.5.3
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Redis redis-py. This flaw allows a remote, authenticated attacker to obtain sensitive information caused by an issue with leaving a connection open after canceling an async Redis command at an inopportune time. By sending a specially crafted request, an attacker can obtain sensitive information and use this information to launch further attacks against the affected system.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Avinash Hanwate 2023-03-27 12:32:40 UTC
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3; however, CVE-2023-28859 is a separate vulnerability.


Comment 4 Avinash Hanwate 2023-07-11 06:08:47 UTC
Created pymodbus tracking bugs for this issue:

Affects: fedora-all [bug 2221861]

Note You need to log in before you can comment on or make changes to this bug.