{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"redis security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for redis is now available for openEuler-20.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Redis is an advanced key-value store. It is often referred to as a dattructure server since keys can contain strings, hashes ,lists, sets anorted sets.\n\nSecurity Fix(es):\n\nRedis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.(CVE-2023-45145)\n\nRedis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31228)\n\nRedis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31449)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for redis is now available for openEuler-20.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"redis",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2230",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2230"
			},
			{
				"summary":"CVE-2023-45145",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-45145&packageName=redis"
			},
			{
				"summary":"CVE-2024-31228",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-31228&packageName=redis"
			},
			{
				"summary":"CVE-2024-31449",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-31449&packageName=redis"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
			},
			{
				"summary":"openEuler-SA-2024-2230 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2230.json"
			}
		],
		"title":"An update for redis is now available for openEuler-20.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2024-10-12T20:26:08+08:00",
			"revision_history":[
				{
					"date":"2024-10-12T20:26:08+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-10-12T20:26:08+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-12T20:26:08+08:00",
			"id":"openEuler-SA-2024-2230",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"openEuler-20.03-LTS-SP4",
									"name":"openEuler-20.03-LTS-SP4"
								},
								"name":"openEuler-20.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-4.0.11-20.oe2003sp4.aarch64.rpm",
									"name":"redis-4.0.11-20.oe2003sp4.aarch64.rpm"
								},
								"name":"redis-4.0.11-20.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-debuginfo-4.0.11-20.oe2003sp4.aarch64.rpm",
									"name":"redis-debuginfo-4.0.11-20.oe2003sp4.aarch64.rpm"
								},
								"name":"redis-debuginfo-4.0.11-20.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-debugsource-4.0.11-20.oe2003sp4.aarch64.rpm",
									"name":"redis-debugsource-4.0.11-20.oe2003sp4.aarch64.rpm"
								},
								"name":"redis-debugsource-4.0.11-20.oe2003sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-4.0.11-20.oe2003sp4.src.rpm",
									"name":"redis-4.0.11-20.oe2003sp4.src.rpm"
								},
								"name":"redis-4.0.11-20.oe2003sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-4.0.11-20.oe2003sp4.x86_64.rpm",
									"name":"redis-4.0.11-20.oe2003sp4.x86_64.rpm"
								},
								"name":"redis-4.0.11-20.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-debuginfo-4.0.11-20.oe2003sp4.x86_64.rpm",
									"name":"redis-debuginfo-4.0.11-20.oe2003sp4.x86_64.rpm"
								},
								"name":"redis-debuginfo-4.0.11-20.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"redis-debugsource-4.0.11-20.oe2003sp4.x86_64.rpm",
									"name":"redis-debugsource-4.0.11-20.oe2003sp4.x86_64.rpm"
								},
								"name":"redis-debugsource-4.0.11-20.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-4.0.11-20.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
					"name":"redis-4.0.11-20.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-debuginfo-4.0.11-20.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
					"name":"redis-debuginfo-4.0.11-20.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-debugsource-4.0.11-20.oe2003sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
					"name":"redis-debugsource-4.0.11-20.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-4.0.11-20.oe2003sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
					"name":"redis-4.0.11-20.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-4.0.11-20.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
					"name":"redis-4.0.11-20.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-debuginfo-4.0.11-20.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
					"name":"redis-debuginfo-4.0.11-20.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"redis-debugsource-4.0.11-20.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64",
					"name":"redis-debugsource-4.0.11-20.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-45145",
			"notes":[
				{
					"text":"Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					],
					"details":"redis security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2230"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.6,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2023-45145"
		},
		{
			"cve":"CVE-2024-31228",
			"notes":[
				{
					"text":"Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					],
					"details":"redis security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2230"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-31228"
		},
		{
			"cve":"CVE-2024-31449",
			"notes":[
				{
					"text":"Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
					"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
					"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					],
					"details":"redis security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2230"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.aarch64",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.src",
						"openEuler-20.03-LTS-SP4:redis-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debuginfo-4.0.11-20.oe2003sp4.x86_64",
						"openEuler-20.03-LTS-SP4:redis-debugsource-4.0.11-20.oe2003sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-31449"
		}
	]
}