openSUSE-SU-2015:2241-1: moderate: Security update for gpg2
openSUSE Security Update: Security update for gpg2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:2241-1 Rating: moderate References: #918089 #918090 #952347 #955753 Cross-References: CVE-2015-1606 CVE-2015-1607 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: The gpg2 package was updated to fix the following security and non security issues: - CVE-2015-1606: Fixed invalid memory read using a garbled keyring (bsc#918089). - CVE-2015-1607: Fixed memcpy with overlapping ranges (bsc#918090). - bsc#955753: Fixed a regression of "gpg --recv" due to keyserver import filter (also boo#952347). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2015-886=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): gpg2-2.0.24-5.1 gpg2-debuginfo-2.0.24-5.1 gpg2-debugsource-2.0.24-5.1 - openSUSE Leap 42.1 (noarch): gpg2-lang-2.0.24-5.1 References: https://www.suse.com/security/cve/CVE-2015-1606.html https://www.suse.com/security/cve/CVE-2015-1607.html https://bugzilla.suse.com/918089 https://bugzilla.suse.com/918090 https://bugzilla.suse.com/952347 https://bugzilla.suse.com/955753
participants (1)
-
opensuse-security@opensuse.org