Security update for gpg2
| Announcement ID: | SUSE-SU-2026:0378-1 |
|---|---|
| Release Date: | 2026-02-04T07:38:17Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves one vulnerability and has three security fixes can now be installed.
Description:
This update for gpg2 fixes the following issues:
- CVE-2025-68973: Fixed possile memory corruption in the armor parser [T7906] (bsc#1255715)
- Fixed GnuPG Accepting Path Separators and Path Traversals in Literal Data (bsc#1256389)
- Fixed Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (bsc#1256390)
- Fixed error out on unverified output for non-detached signatures [T7903] (bsc#1256244)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-378=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-378=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- gpg2-debugsource-2.0.24-9.17.1
- gpg2-2.0.24-9.17.1
- gpg2-debuginfo-2.0.24-9.17.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- gpg2-lang-2.0.24-9.17.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- gpg2-debugsource-2.0.24-9.17.1
- gpg2-2.0.24-9.17.1
- gpg2-debuginfo-2.0.24-9.17.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- gpg2-lang-2.0.24-9.17.1