{"affected":[{"ecosystem_specific":{"binaries":[{"dirmngr":"2.4.4-150600.3.12.1","gpg2":"2.4.4-150600.3.12.1","gpg2-lang":"2.4.4-150600.3.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP7","name":"gpg2","purl":"pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.4-150600.3.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dirmngr":"2.4.4-150600.3.12.1","gpg2":"2.4.4-150600.3.12.1","gpg2-lang":"2.4.4-150600.3.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP6-LTSS","name":"gpg2","purl":"pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.4-150600.3.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dirmngr":"2.4.4-150600.3.12.1","gpg2":"2.4.4-150600.3.12.1","gpg2-lang":"2.4.4-150600.3.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP6","name":"gpg2","purl":"pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.4-150600.3.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dirmngr":"2.4.4-150600.3.12.1","gpg2":"2.4.4-150600.3.12.1","gpg2-lang":"2.4.4-150600.3.12.1","gpg2-tpm":"2.4.4-150600.3.12.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"gpg2","purl":"pkg:rpm/opensuse/gpg2&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.4-150600.3.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for gpg2 fixes the following issues:\n\n- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).\n- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).\n- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).\n- Fix a memory leak in gpg2 agent (bsc#1256243).\n- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).\n","id":"SUSE-SU-2026:0215-1","modified":"2026-01-22T12:10:17Z","published":"2026-01-22T12:10:17Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260215-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68973"}],"related":["CVE-2025-68973"],"summary":"Security update for gpg2","upstream":["CVE-2025-68973"]}