In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnupg:gnupg:*:*:*:*:-:*:*:* |
Fri, 02 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 30 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | gnupg: GnuPG: Signature bypass via form feed character in signed messages | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 27 Dec 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnupg
Gnupg gnupg |
|
| CPEs | cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gnupg
Gnupg gnupg |
Sat, 27 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line. | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-27T22:52:30.957Z
Updated: 2026-01-02T20:44:27.393Z
Reserved: 2025-12-27T22:52:30.688Z
Link: CVE-2025-68972
Updated: 2025-12-29T16:42:59.488Z
Status : Analyzed
Published: 2025-12-27T23:15:40.900
Modified: 2026-01-09T20:08:47.323
Link: CVE-2025-68972