Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68973

Опубликовано: 28 дек. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

A flaw was found in GnuPG. An attacker can provide crafted input to the armor_filter function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.

Отчет

This vulnerability is rated Important for Red Hat products. The flaw in GnuPG's armor_filter function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.

Меры по смягчению последствий

To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gnupg2Out of support scope
Red Hat Enterprise Linux 10gnupg2FixedRHSA-2026:069715.01.2026
Red Hat Enterprise Linux 10.0 Extended Update Supportgnupg2FixedRHSA-2026:162902.02.2026
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgnupg2FixedRHSA-2026:167702.02.2026
Red Hat Enterprise Linux 8gnupg2FixedRHSA-2026:072815.01.2026
Red Hat Enterprise Linux 8.2 Advanced Update Supportgnupg2FixedRHSA-2026:146828.01.2026
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgnupg2FixedRHSA-2026:101422.01.2026
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-Ongnupg2FixedRHSA-2026:101422.01.2026
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgnupg2FixedRHSA-2026:097422.01.2026
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegnupg2FixedRHSA-2026:097422.01.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-675
https://bugzilla.redhat.com/show_bug.cgi?id=2425966GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write

EPSS

Процентиль: 5%
0.00018
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
3 месяца назад

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

CVSS3: 7.8
nvd
3 месяца назад

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

CVSS3: 7.8
msrc
3 месяца назад

In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)

CVSS3: 7.8
debian
3 месяца назад

In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments ...

suse-cvrf
2 месяца назад

Security update for gpg2

EPSS

Процентиль: 5%
0.00018
Низкий

7.8 High

CVSS3