Bug 2425646 (CVE-2025-68972) - CVE-2025-68972 gnupg: GnuPG: Signature bypass via form feed character in signed messages
Summary: CVE-2025-68972 gnupg: GnuPG: Signature bypass via form feed character in sign...
Keywords:
Status: NEW
Alias: CVE-2025-68972
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2425763 2425764 2425765 2425766 2425767
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-27 23:01 UTC by OSIDB Bzimport
Modified: 2025-12-29 13:57 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-12-27 23:01:08 UTC
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.


Note You need to log in before you can comment on or make changes to this bug.