<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for valkey</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03499-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-08T18:35:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-08T18:35:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-08T18:35:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for valkey</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for valkey to version 8.0.6 fixes the following issues:

- CVE-2025-49844: Malicious Lua scripts may lead to remote code execution.
  [bsc#1250995]

- CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and
  potential remote code execution. [bsc#1250995]

- CVE-2025-46818: Malicious Lua scripts can be executed in the context of
  another user. [bsc#1250995]

- CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to
  facilitate denial-of-service attacks. [bsc#1250995]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container private-registry/harbor-valkey:latest-2025-3499,SUSE-2025-3499,SUSE-SLE-Module-Server-Applications-15-SP6-2025-3499,openSUSE-SLE-15.6-2025-3499</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503499-1/</URL>
      <Description>Link for SUSE-SU-2025:03499-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03499-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250995</URL>
      <Description>SUSE Bug 1250995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46817/</URL>
      <Description>SUSE CVE CVE-2025-46817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46818/</URL>
      <Description>SUSE CVE CVE-2025-46818 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46819/</URL>
      <Description>SUSE CVE CVE-2025-46819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-49844/</URL>
      <Description>SUSE CVE CVE-2025-49844 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container private-registry/harbor-valkey:latest">
      <Branch Type="Product Name" Name="Container private-registry/harbor-valkey:latest">
        <FullProductName ProductID="Container private-registry/harbor-valkey:latest">Container private-registry/harbor-valkey:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6" CPE="cpe:/o:suse:sle-module-server-applications:15:sp6">SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="valkey-8.0.6-150600.13.17.1">
      <FullProductName ProductID="valkey-8.0.6-150600.13.17.1">valkey-8.0.6-150600.13.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="valkey-compat-redis-8.0.6-150600.13.17.1">
      <FullProductName ProductID="valkey-compat-redis-8.0.6-150600.13.17.1">valkey-compat-redis-8.0.6-150600.13.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="valkey-devel-8.0.6-150600.13.17.1">
      <FullProductName ProductID="valkey-devel-8.0.6-150600.13.17.1">valkey-devel-8.0.6-150600.13.17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="valkey-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="Container private-registry/harbor-valkey:latest">
      <FullProductName ProductID="Container private-registry/harbor-valkey:latest:valkey-8.0.6-150600.13.17.1">valkey-8.0.6-150600.13.17.1 as a component of Container private-registry/harbor-valkey:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-8.0.6-150600.13.17.1">valkey-8.0.6-150600.13.17.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-compat-redis-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-compat-redis-8.0.6-150600.13.17.1">valkey-compat-redis-8.0.6-150600.13.17.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-devel-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-devel-8.0.6-150600.13.17.1">valkey-devel-8.0.6-150600.13.17.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:valkey-8.0.6-150600.13.17.1">valkey-8.0.6-150600.13.17.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-compat-redis-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:valkey-compat-redis-8.0.6-150600.13.17.1">valkey-compat-redis-8.0.6-150600.13.17.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="valkey-devel-8.0.6-150600.13.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:valkey-devel-8.0.6-150600.13.17.1">valkey-devel-8.0.6-150600.13.17.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.</Note>
    </Notes>
    <CVE>CVE-2025-46817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-valkey:latest:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503499-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46817.html</URL>
        <Description>CVE-2025-46817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250995</URL>
        <Description>SUSE Bug 1250995</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.</Note>
    </Notes>
    <CVE>CVE-2025-46818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-valkey:latest:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503499-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46818.html</URL>
        <Description>CVE-2025-46818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250995</URL>
        <Description>SUSE Bug 1250995</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.</Note>
    </Notes>
    <CVE>CVE-2025-46819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-valkey:latest:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503499-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46819.html</URL>
        <Description>CVE-2025-46819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250995</URL>
        <Description>SUSE Bug 1250995</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.</Note>
    </Notes>
    <CVE>CVE-2025-49844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container private-registry/harbor-valkey:latest:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-compat-redis-8.0.6-150600.13.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:valkey-devel-8.0.6-150600.13.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503499-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-49844.html</URL>
        <Description>CVE-2025-49844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250995</URL>
        <Description>SUSE Bug 1250995</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
