|
|
Log in / Subscribe / Register

SUSE alert openSUSE-SU-2026:20029-1 (gpg2)

From:  meissner@suse.com
To:  security-announce@lists.opensuse.org
Subject:  openSUSE-SU-2026:20029-1: important: Security update for gpg2
Date:  Thu, 15 Jan 2026 17:52:35 +0100
Message-ID:  <20260115165235.3D554FBA0@maintenance.suse.de>
Archive-link:  Article

openSUSE security update: security update for gpg2 ------------------------------------------------------------- Announcement ID: openSUSE-SU-2026:20029-1 Rating: important References: * bsc#1255715 * bsc#1256244 * bsc#1256246 * bsc#1256390 Cross-References: * CVE-2025-68973 CVSS scores: * CVE-2025-68973 ( SUSE ): 8 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N Affected Products: openSUSE Leap 16.0 ------------------------------------------------------------- An update that solves one vulnerability and has 4 bug fixes can now be installed. Description: This update for gpg2 fixes the following issues: - CVE-2025-68973: out-of-bounds write when processing specially crafted input in the armor parser can lead to memory corruption (bsc#1255715). Other security fixes: - gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures (bsc#1256246). - gpg: Error out on unverified output for non-detached signatures (bsc#1256244). - gpg: Deprecate the option --not-dash-escaped (bsc#1256390). Patch instructions: To install this openSUSE security update use the suse recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 16.0 zypper in -t patch openSUSE-Leap-16.0-138=1 Package List: - openSUSE Leap 16.0: dirmngr-2.5.5-160000.3.1 gpg2-2.5.5-160000.3.1 gpg2-lang-2.5.5-160000.3.1 gpg2-tpm-2.5.5-160000.3.1 References: * https://www.suse.com/security/cve/CVE-2025-68973.html


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds