redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
The product does not properly “clean up” and remove temporary or supporting resources after they have been used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Redis-py | Redis | 4.2.0 (including) | 4.4.4 (excluding) |
Redis-py | Redis | 4.5.0 (including) | 4.5.4 (excluding) |
Python-redis | Ubuntu | bionic | * |
Python-redis | Ubuntu | devel | * |
Python-redis | Ubuntu | esm-apps/noble | * |
Python-redis | Ubuntu | kinetic | * |
Python-redis | Ubuntu | lunar | * |
Python-redis | Ubuntu | mantic | * |
Python-redis | Ubuntu | noble | * |
Python-redis | Ubuntu | oracular | * |
Python-redis | Ubuntu | trusty | * |
Python-redis | Ubuntu | xenial | * |