<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for redis</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3407-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-08-23T18:08:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-08-23T18:08:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-08-23T18:08:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for redis</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for redis fixes the following issues:

- CVE-2023-28856: Fixed possible DoS when using HINCRBYFLOAT to create an hash field. (bsc#1210548)
- CVE-2022-24834: Fixed a heap overflow in the cjson and cmsgpack libraries. (bsc#1213193)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-3407,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3407,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3407,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3407,SUSE-SLE-Product-RT-15-SP3-2023-3407,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3407,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3407,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3407,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3407,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3407,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3407,SUSE-Storage-7-2023-3407,SUSE-Storage-7.1-2023-3407</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233407-1/</URL>
      <Description>Link for SUSE-SU-2023:3407-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-August/016003.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3407-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210548</URL>
      <Description>SUSE Bug 1210548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213193</URL>
      <Description>SUSE Bug 1213193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-24834/</URL>
      <Description>SUSE CVE CVE-2022-24834 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28856/</URL>
      <Description>SUSE CVE CVE-2023-28856 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7">
        <FullProductName ProductID="SUSE Enterprise Storage 7" CPE="cpe:/o:suse:ses:7">SUSE Enterprise Storage 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp2">SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Real Time 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Real Time 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3" CPE="cpe:/o:suse:sle_rt:15:sp3">SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp2">SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2" CPE="cpe:/o:suse:sles_sap:15:sp2">SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.2">
        <FullProductName ProductID="SUSE Manager Proxy 4.2" CPE="cpe:/o:suse:suse-manager-proxy:4.2">SUSE Manager Proxy 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.2">
        <FullProductName ProductID="SUSE Manager Server 4.2" CPE="cpe:/o:suse:suse-manager-server:4.2">SUSE Manager Server 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="redis-6.0.14-150200.6.26.1">
      <FullProductName ProductID="redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1</FullProductName>
    </Branch>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7">
      <FullProductName ProductID="SUSE Enterprise Storage 7:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Enterprise Storage 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.2">
      <FullProductName ProductID="SUSE Manager Proxy 4.2:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Manager Proxy 4.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis-6.0.14-150200.6.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.2">
      <FullProductName ProductID="SUSE Manager Server 4.2:redis-6.0.14-150200.6.26.1">redis-6.0.14-150200.6.26.1 as a component of SUSE Manager Server 4.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.</Note>
    </Notes>
    <CVE>CVE-2022-24834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.2:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Manager Server 4.2:redis-6.0.14-150200.6.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233407-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-24834.html</URL>
        <Description>CVE-2022-24834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213193</URL>
        <Description>SUSE Bug 1213193</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2023-28856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.2:redis-6.0.14-150200.6.26.1</ProductID>
        <ProductID>SUSE Manager Server 4.2:redis-6.0.14-150200.6.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233407-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28856.html</URL>
        <Description>CVE-2023-28856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210548</URL>
        <Description>SUSE Bug 1210548</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
