Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0214-1

Опубликовано: 22 янв. 2026
Источник: suse-cvrf

Описание

Security update for gpg2

This update for gpg2 fixes the following issues:

  • CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
  • Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
  • Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
  • Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).

Список пакетов

Container suse/sle-micro-rancher/5.2:latest
gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/5.2/toolbox:latest
gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/base-5.5:latest
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-Hardened-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAPCAL
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAPCAL-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-BYOS-EC2
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-SAP-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-SAPCAL-GCE
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.2
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.3
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.4
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.5
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server 15 SP4-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server 15 SP5-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP5
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1

Описание

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/5.2/toolbox:latest:gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/base-5.5:latest:gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS-GCE:gpg2-2.2.27-150300.3.16.1

Ссылки