[CLSA-2026:1769015071] Fix CVE(s): CVE-2025-68973
Type:
security
Severity:
Important
Release date:
2026-01-23 19:03:15 UTC
Description:
* SECURITY UPDATE: memory corruption in armor parser - debian/patches/CVE-2025-68973.patch: Fix faulty double increment in armor_filter function. - CVE-2025-68973
Updated packages:
  • dirmngr_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:ede4350796f3ab65353cdc2b61167eadcd46c0ef
  • gnupg_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:edcc76e95514b2143397b27b3a1ca4d19f478d17
  • gnupg-agent_2.2.4-1ubuntu1.6+tuxcare.els1_all.deb
    sha:182b065681706042790560262cc59d45443f91ec
  • gnupg-l10n_2.2.4-1ubuntu1.6+tuxcare.els1_all.deb
    sha:4586f098703bb523dbf3a47f732e57bce434d6d7
  • gnupg-utils_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:c6ba0197e3754d718fc454b77539a8550d3cc12c
  • gnupg2_2.2.4-1ubuntu1.6+tuxcare.els1_all.deb
    sha:de66f72edc6606ed20f6b8f52f393aff788ed51e
  • gpg_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:ef2d2d08a70852b28bbc81de820dd44eba53333a
  • gpg-agent_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:7b3f7e95f7398bbe75770c3f4117ba90d08fa00f
  • gpg-wks-client_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:4992d4b655d3a05c2ca625b49ddfa9146ecc3f06
  • gpg-wks-server_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:36d56a206abfab134af8c1f7b4c9bdab47ee650e
  • gpgconf_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:7518c3167d3d0629f67d633271ce8d8a3cbbc829
  • gpgsm_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:aaa2402dbb09f83c6e3ab4552304e702021b46f6
  • gpgv_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:76294c0220c14468023f0249b573431b56333d90
  • gpgv-static_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:1988f7b6e00775238f4061c0ea577dff200849b0
  • gpgv-win32_2.2.4-1ubuntu1.6+tuxcare.els1_all.deb
    sha:d07e5903324d80e5b76b6c8d65a79c14ef9c63a1
  • gpgv2_2.2.4-1ubuntu1.6+tuxcare.els1_all.deb
    sha:2d51529f5e8d9e21993071d52aa99185c4a8fe53
  • scdaemon_2.2.4-1ubuntu1.6+tuxcare.els1_amd64.deb
    sha:8fa0b83d5bd1e8e05ce2167ca0bc0516468cd49e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.