Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68972

Опубликовано: 27 дек. 2025
Источник: redhat
CVSS3: 5.9

Описание

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.

Отчет

This vulnerability is rated Moderate for Red Hat products as it affects GnuPG, allowing an attacker to append unsigned text to a signed message while signature verification still reports success. This integrity bypass could lead to spoofing of signed communications, impacting the authenticity of signed data in Red Hat Enterprise Linux environments.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gnupg2Fix deferred
Red Hat Enterprise Linux 6gnupg2Out of support scope
Red Hat Enterprise Linux 7gnupg2Fix deferred
Red Hat Enterprise Linux 8gnupg2Fix deferred
Red Hat Enterprise Linux 9gnupg2Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=2425646gnupg: GnuPG: Signature bypass via form feed character in signed messages

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
3 месяца назад

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

CVSS3: 5.9
nvd
3 месяца назад

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

CVSS3: 5.9
msrc
3 месяца назад

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

CVSS3: 5.9
debian
3 месяца назад

In GnuPG through 2.4.8, if a signed message has \f at the end of a pla ...

CVSS3: 4.7
redos
3 дня назад

Уязвимость gnupg2

5.9 Medium

CVSS3