[CLSA-2026:1768989383] Fix CVE(s): CVE-2025-68973
Type:
security
Severity:
Important
Release date:
2026-01-22 14:00:16 UTC
Description:
* SECURITY UPDATE: Possible memory corruption in the armor parser - debian/patches/CVE-2025-68973.patch: fix faulty double increment - CVE-2025-68973
Updated packages:
  • dirmngr_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:f2d924e001e4a7cd2c177e9884c071932ff8815d
  • gnupg_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:f68a3f0587c56a003b5a94f84f6231a9a680b608
  • gnupg-agent_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:1d8cdeddc6999cdb6b588c80cca90f04c59073b1
  • gnupg-l10n_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:cb3bdeee3109100300e624a63b5a19e9bc2de8dc
  • gnupg-utils_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:7be1e5087cb78bf0f8d78f04a37e7ada3da8ca0d
  • gnupg2_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:927fda0175f26298c416a5b7f14a592cb13e8c8f
  • gpg_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:d533bdbb8d05368b7a53a6fcbe42b8c21ab9db43
  • gpg-agent_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:57bd374d22b0d33c8d3748b2efec652e5216001a
  • gpg-wks-client_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:e09be7e672e23167d90c2a41d38a6b9aaefd1601
  • gpg-wks-server_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:ce5a9aa41c8300d6aca591d80cf12b8ea964f549
  • gpgconf_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:111fd05e35c4a453dfc790f28169a4735b41cc9a
  • gpgsm_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:7377ca869a7ccfa8dea5559ff89584a168c41530
  • gpgv_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:38ba6f70559ca40d13559ce3de3604fd7bab49b7
  • gpgv-static_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:9427466a05fbb3150dd782304a9f9a75ac8b03cb
  • gpgv-win32_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:5fcad3928538e00d1399d90dbf4d22fd0f0310f3
  • gpgv2_2.2.19-3ubuntu2.5+tuxcare.els1_all.deb
    sha:2da485a05d4040ee6d15ecac5297f5fc1638c631
  • scdaemon_2.2.19-3ubuntu2.5+tuxcare.els1_amd64.deb
    sha:cfa4a3c2bc5a89937b62c5ec193b10df133948a9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.