kredis 0.2.3

1 security vulnerability found in version 0.2.3

Possible Deserialization of Untrusted Data Vulnerability in Kredis JSON

medium severity CVE-2023-27531
medium severity CVE-2023-27531
Patched versions: >= 1.3.0.1

There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.

'Not affected: None.' 'Versions Affected: All.' 'Fixed Versions: 1.3.0.1'

Impact Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system.

Any applications using Kredis with JSON are affected.

Releases The fixed releases are available at the normal locations.

Workarounds There are no feasible workarounds for this issue.

Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.

  • 1-3-0-1-kredis.patch - Patch for 1.3.0 series

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.