[CLSA-2026:1769524269] Fix CVE(s): CVE-2025-68973
Type:
security
Severity:
Important
Release date:
2026-01-27 14:31:13 UTC
Description:
* SECURITY UPDATE: memory corruption in armor parser - debian/patches/CVE-2025-68973.patch: fix faulty double increment. - CVE-2025-68973
Updated packages:
  • dirmngr_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:990c1eb963c9fc0904fe0214842ec14206e2ae01
  • gnupg_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:8b688e87acb083673e76306fd2def06a02e1f8a6
  • gnupg-agent_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:73779d20c5a59ce622127b3df182f90d23f478c0
  • gnupg-l10n_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:41bb43464346773d5161fceea1529c0b9d4c35e2
  • gnupg-utils_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:caf9baad999eacd6007c2f0a18878eea390dc798
  • gnupg2_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:37f3a078b65914147d46776e30e504cd38634869
  • gpg_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:d06c5984c1e399cb75c879490d12abcb40a7d479
  • gpg-agent_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:8a62ece0f16979f0b44f0cf4a608970bf67c5c29
  • gpg-wks-client_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:06036914067dcf2b77a8d55526c238dc63db1639
  • gpg-wks-server_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:62908330a05856037ae13968ff2e886ac5ea6c07
  • gpgconf_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:b3c9831abc9fd00194cd430afdb9854c957c5470
  • gpgsm_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:e9a4380c421b566669f5cb56cde85e527e7fe23d
  • gpgv_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:a3eab44079db215162c5125b7df9616ab88873fd
  • gpgv-static_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:e29eac9869f00fd5d3fa48896cf2f15db69a0ca0
  • gpgv-win32_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:366253367800bde0445eb219baaeecb132353734
  • gpgv2_2.2.12-1+deb10u2+tuxcare.els1_all.deb
    sha:f1a7ac83b61133b2b366b059b8284306ec6b7136
  • scdaemon_2.2.12-1+deb10u2+tuxcare.els1_amd64.deb
    sha:1c83962721f9b1d72cfe0fdd2c061f45519770b8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.