Improper Verification of Cryptographic Signature Affecting gpg package, versions <2.4.9-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-GPG-14912595
  • published11 Jan 2026
  • disclosed27 Dec 2025

Introduced: 27 Dec 2025

CVE-2025-68972  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade Minimos:latest gpg to version 2.4.9-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gpg package and not the gpg package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

CVSS Base Scores

version 3.1