Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 903137 (CVE-2023-28858, CVE-2023-28859) - dev-python/redis: multiple vulnerabilities
Summary: dev-python/redis: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2023-28858, CVE-2023-28859
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-03-26 22:23 UTC by John Helmert III
Modified: 2023-03-26 22:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-03-26 22:23:15 UTC
CVE-2023-28858 (https://github.com/redis/redis-py/pull/2641):

redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3; however, CVE-2023-28859 is a separate vulnerability.

CVE-2023-28859 (https://github.com/redis/redis-py/pull/2641):

redis-py through 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.

https://openai.com/blog/march-20-chatgpt-outage

Despite the CVE descriptions, the fix for both is in the 4.5.3 tag: https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965