CVE-2025-68972
Public on 2025-12-27
Modified on 2026-02-05
Description
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
Exploitation of this vulnerability requires an attacker to obtain a legitimate signature on crafted content and trick users into trusting unsigned material displayed alongside signed content without properly verifying signed contents. There is no fix available from the GnuPG project. Users are advised to mitigate this issue by avoiding using cleartext signatures and always using “gpg —output“ to verify what content was actually signed.
Exploitation of this vulnerability requires an attacker to obtain a legitimate signature on crafted content and trick users into trusting unsigned material displayed alongside signed content without properly verifying signed contents. There is no fix available from the GnuPG project. Users are advised to mitigate this issue by avoiding using cleartext signatures and always using “gpg —output“ to verify what content was actually signed.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 2 - Core | gnupg2 | No Fix Planned | ||
| Amazon Linux 2023 | gnupg2 | No Fix Planned |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 5.9 | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N |
| NVD | CVSSv3 | 4.7 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N |