CVE-2025-68972

Public on 2025-12-27
Modified on 2026-02-05
Description
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

Exploitation of this vulnerability requires an attacker to obtain a legitimate signature on crafted content and trick users into trusting unsigned material displayed alongside signed content without properly verifying signed contents. There is no fix available from the GnuPG project. Users are advised to mitigate this issue by avoiding using cleartext signatures and always using “gpg —output“ to verify what content was actually signed.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
5.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core gnupg2 No Fix Planned
Amazon Linux 2023 gnupg2 No Fix Planned

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
NVD CVSSv3 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N