SUSE-SU-2019:2006-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20192006-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:2006-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2019:2006-1
Upstream
  • CVE-2019-13050
Related
  • CVE-2019-13050
Published
2019-07-29T11:02:53Z
Modified
2026-03-11T07:10:25.552415Z
Summary
Security update for gpg2
Details

This update for gpg2 fixes the following issues:

Security issue fixed:

  • CVE-2019-13050: Fixed a denial of service attacks via big keys (bsc#1141093).

Non-security issue fixed:

  • Allow coredumps in X11 desktop sessions (bsc#1124847)
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / gpg2

Package

Name
gpg2
Purl
pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.5-4.11.1

Ecosystem specific

{
    "binaries": [
        {
            "gpg2": "2.2.5-4.11.1",
            "gpg2-lang": "2.2.5-4.11.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:2006-1.json"

SUSE:Linux Enterprise Module for Basesystem 15 SP1 / gpg2

Package

Name
gpg2
Purl
pkg:rpm/suse/gpg2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.5-4.11.1

Ecosystem specific

{
    "binaries": [
        {
            "gpg2": "2.2.5-4.11.1",
            "gpg2-lang": "2.2.5-4.11.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:2006-1.json"