Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. redis
  4. ›
  5. CVE-2023-28859

CVE-2023-28859: redis-py Race Condition due to incomplete fix

March 26, 2023 (updated October 25, 2024)

redis-py through 4.5.3 and 4.4.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.

References

  • github.com/advisories/GHSA-8fww-64cx-x8p5
  • github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml
  • github.com/redis/redis-py
  • github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965
  • github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb
  • github.com/redis/redis-py/issues/2665
  • github.com/redis/redis-py/pull/1899
  • github.com/redis/redis-py/pull/2641
  • github.com/redis/redis-py/pull/2666
  • github.com/redis/redis-py/pull/2671
  • github.com/redis/redis-py/releases/tag/v4.4.4
  • github.com/redis/redis-py/releases/tag/v4.5.4
  • nvd.nist.gov/vuln/detail/CVE-2023-28859

Code Behaviors & Features

Detect and mitigate CVE-2023-28859 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.2.0 before 4.4.4, all versions starting from 4.5.0 before 4.5.4

Fixed versions

  • 4.5.4
  • 4.4.4

Solution

Upgrade to versions 4.4.4, 4.5.4 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-459: Incomplete Cleanup

Source file

pypi/redis/CVE-2023-28859.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:15 +0000.