<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2021-3470</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2021-3470</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>9</Number>
        <Date>2022-11-09T01:13:07Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:46:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-11-09T01:13:07Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2021-3470</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Retail Branch Server 4.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2" CPE="cpe:/o:suse:sle-module-server-applications:15:sp2">SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="redis">
      <FullProductName ProductID="redis" CPE="cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*">redis</FullProductName>
    </Branch>
    <Relationship ProductReference="redis" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP2:redis">redis as a component of SUSE Linux Enterprise Module for Server Applications 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.</Note>
    </Notes>
    <CVE>CVE-2021-3470</CVE>
    <ProductStatuses>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP2:redis</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
