<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for redis7</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:2925-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-07-20T19:34:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-07-20T19:34:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-07-20T19:34:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for redis7</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for redis7 fixes the following issues:

  - CVE-2022-24834: Fixed heap overflow in the cjson and cmsgpack libraries (bsc#1213193).
  - CVE-2023-28856: Fixed HINCRBYFLOAT invalid key crash (bsc#1210548).
  - CVE-2022-36021: Fixed integer overflow via Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD (bsc#1208790).
  - CVE-2023-25155: Fixed Integer Overflow in RAND commands (bsc#1208793).
  - CVE-2023-28425: Fixed denial-of-service via Specially crafted MSETNX command (bsc#1209528).
  - CVE-2023-36824: Fixed heap overflow in COMMAND GETKEYS and ACL evaluation (bsc#1213249).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-2925,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2925,openSUSE-SLE-15.5-2023-2925</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      <Description>Link for SUSE-SU-2023:2925-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-July/015551.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:2925-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208790</URL>
      <Description>SUSE Bug 1208790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208793</URL>
      <Description>SUSE Bug 1208793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209528</URL>
      <Description>SUSE Bug 1209528</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210548</URL>
      <Description>SUSE Bug 1210548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213193</URL>
      <Description>SUSE Bug 1213193</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213249</URL>
      <Description>SUSE Bug 1213249</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-24834/</URL>
      <Description>SUSE CVE CVE-2022-24834 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36021/</URL>
      <Description>SUSE CVE CVE-2022-36021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25155/</URL>
      <Description>SUSE CVE CVE-2023-25155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28425/</URL>
      <Description>SUSE CVE CVE-2023-28425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28856/</URL>
      <Description>SUSE CVE CVE-2023-28856 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-36824/</URL>
      <Description>SUSE CVE CVE-2023-36824 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP5" CPE="cpe:/o:suse:sle-module-server-applications:15:sp5">SUSE Linux Enterprise Module for Server Applications 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="redis7-7.0.8-150500.3.3.1">
      <FullProductName ProductID="redis7-7.0.8-150500.3.3.1">redis7-7.0.8-150500.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="redis7-7.0.8-150500.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1">redis7-7.0.8-150500.3.3.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="redis7-7.0.8-150500.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1">redis7-7.0.8-150500.3.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.</Note>
    </Notes>
    <CVE>CVE-2022-24834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-24834.html</URL>
        <Description>CVE-2022-24834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213193</URL>
        <Description>SUSE Bug 1213193</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.</Note>
    </Notes>
    <CVE>CVE-2022-36021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36021.html</URL>
        <Description>CVE-2022-36021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208790</URL>
        <Description>SUSE Bug 1208790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208793</URL>
        <Description>SUSE Bug 1208793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.</Note>
    </Notes>
    <CVE>CVE-2023-25155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25155.html</URL>
        <Description>CVE-2023-25155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208790</URL>
        <Description>SUSE Bug 1208790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208793</URL>
        <Description>SUSE Bug 1208793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.</Note>
    </Notes>
    <CVE>CVE-2023-28425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28425.html</URL>
        <Description>CVE-2023-28425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209528</URL>
        <Description>SUSE Bug 1209528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2023-28856</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28856.html</URL>
        <Description>CVE-2023-28856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210548</URL>
        <Description>SUSE Bug 1210548</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

</Note>
    </Notes>
    <CVE>CVE-2023-36824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP5:redis7-7.0.8-150500.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:redis7-7.0.8-150500.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232925-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-36824.html</URL>
        <Description>CVE-2023-36824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213249</URL>
        <Description>SUSE Bug 1213249</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
