Описание
Security update for gpg2
This update for gpg2 fixes the following issues:
- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).
Список пакетов
Container suse/sle-micro-rancher/5.2:latest
gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/5.2/toolbox:latest
gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/base-5.5:latest
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-Hardened-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-BYOS
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAP-Hardened-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAPCAL
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-SAPCAL-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-BYOS-EC2
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-Hardened-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-SAP-BYOS-GCE
gpg2-2.2.27-150300.3.16.1
Image SLES15-SP5-SAPCAL-GCE
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.2
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.3
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.4
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Micro 5.5
gpg2-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server 15 SP4-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server 15 SP5-LTSS
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP5
dirmngr-2.2.27-150300.3.16.1
gpg2-2.2.27-150300.3.16.1
gpg2-lang-2.2.27-150300.3.16.1
Ссылки
- Link for SUSE-SU-2026:0214-1
- E-Mail link for SUSE-SU-2026:0214-1
- SUSE Security Ratings
- SUSE Bug 1255715
- SUSE Bug 1256244
- SUSE Bug 1256246
- SUSE Bug 1256390
- SUSE CVE CVE-2025-68973 page
Описание
In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/5.2/toolbox:latest:gpg2-2.2.27-150300.3.16.1
Container suse/sle-micro/base-5.5:latest:gpg2-2.2.27-150300.3.16.1
Image SLES15-SP4-BYOS-GCE:gpg2-2.2.27-150300.3.16.1
Ссылки
- CVE-2025-68973
- SUSE Bug 1255715