{"affected":[{"ecosystem_specific":{"binaries":[{"redis7":"7.0.8-150600.8.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"redis7","purl":"pkg:rpm/opensuse/redis7&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.0.8-150600.8.22.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for redis7 fixes the following issue:\n\n- a user can manipulate data read by a connection by injecting sequences into a Redis error reply (bsc#1258706).\n","id":"SUSE-SU-2026:0667-1","modified":"2026-02-26T15:19:55Z","published":"2026-02-26T15:19:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260667-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258706"}],"related":[],"summary":"Security update for redis7","upstream":[]}