{"affected":[{"ecosystem_specific":{"binaries":[{"gpg2":"2.4.4-slfo.1.1_6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"gpg2","purl":"pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.4-slfo.1.1_6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for gpg2 fixes the following issues:\n\n- CVE-2025-68973: out-of-bounds write when processing specially crafted input in the armor parser can lead to memory corruption (bsc#1255715).\n\nOther security fixes:\n\n- gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures (bsc#1256246).\n- gpg: Error out on unverified output for non-detached signatures (bsc#1256244).\n- agent: Fix a memory leak (bsc#1256243).\n- gpg: Deprecate the option --not-dash-escaped (bsc#1256390).\n","id":"SUSE-SU-2026:20356-1","modified":"2026-01-14T09:32:10Z","published":"2026-01-14T09:32:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620356-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68973"}],"related":["CVE-2025-68973"],"summary":"Security update for gpg2","upstream":["CVE-2025-68973"]}