Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73192.json
JSON Data
https://api.osv.dev/v1/vulns/AZL-73192
Upstream
Published
2025-12-27T23:15:40Z
Modified
2026-04-21T04:33:50.633833Z
Summary
CVE-2025-68972 affecting package gnupg2 for versions less than 2.4.9-1
Details

In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.

References

Affected packages

Azure Linux:3 / gnupg2

Package

Name
gnupg2
Purl
pkg:rpm/azure-linux/gnupg2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.9-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73192.json"