The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-68973

CVE-2025-68973: GnuPG Buffer Overflow Vulnerability

CVE-2025-68973 is a buffer overflow flaw in GnuPG's armor_filter function that allows out-of-bounds writes via crafted input. This post covers the technical details, affected versions, impact, and mitigation.

Published: May 11, 2026

CVE-2025-68973 Overview

CVE-2025-68973 is an out-of-bounds write vulnerability in GnuPG versions before 2.4.9. The flaw resides in the armor_filter function in g10/armor.c, where an index variable is incremented twice when only one increment is intended. Processing crafted ASCII-armored input triggers memory corruption in the armor parser. ExtendedLTS branches are fixed in 2.2.51 and later releases. The issue is tracked under [CWE-787] (Out-of-bounds Write) and [CWE-675] (Multiple Operations on Resource in Single-Statement Expression). Successful exploitation can compromise confidentiality, integrity, and availability on the affected host.

Critical Impact

A crafted OpenPGP armored message processed by a vulnerable GnuPG build can corrupt memory in the armor_filter, enabling potential code execution or process compromise in the context of the user running gpg.

Affected Products

  • GnuPG versions prior to 2.4.9
  • GnuPG ExtendedLTS versions prior to 2.2.51
  • Linux distributions shipping affected GnuPG packages (e.g., Debian LTS)

Discovery Timeline

  • 2025-12-28 - CVE-2025-68973 published to NVD
  • 2025-12-29 - Openwall oss-security advisory update published
  • 2026-01-14 - Last updated in NVD database

Technical Details for CVE-2025-68973

Vulnerability Analysis

The vulnerability is an out-of-bounds write in the OpenPGP ASCII-armor parser. GnuPG uses armor_filter in g10/armor.c to decode armored input streams into binary OpenPGP packets. The parser maintains an output index n and a source index afx->buffer_pos. A for loop iterates while n < size and copies bytes from the internal buffer into the caller-supplied buf. Because the loop body and the loop's for statement both increment n, the index advances by two per iteration. This double increment writes data past the bounds of buf and skips valid output positions, producing both memory corruption and content desynchronization. The flaw was demonstrated publicly in the gpg.fail research and the 39C3 talk "To Sign or Not to Sign".

Root Cause

The root cause is a programming error matching [CWE-675]: a single statement performs multiple side effects on the same loop variable. The original code increments n in the loop header (n++) and inside the body (buf[n++] = ...), so each successful copy advances n twice. When afx->buffer_len exceeds half of size, writes extend beyond buf[size-1], corrupting adjacent heap memory.

Attack Vector

An attacker supplies a crafted ASCII-armored OpenPGP file to a victim who decodes, verifies, or imports it with a vulnerable gpg binary. The attack vector is local because the malicious input must reach the GnuPG process, but delivery channels include email attachments, signed update artifacts, package signatures, and scripted pipelines. The complexity is high because the attacker must control the layout of the surrounding heap to achieve reliable exploitation.

c
// Patch from g10/armor.c — fix for the double-increment in armor_filter
 	n = 0;
 	if( afx->buffer_len ) {
             /* Copy the data from AFX->BUFFER to BUF.  */
-	    for(; n < size && afx->buffer_pos < afx->buffer_len; n++ )
-		buf[n++] = afx->buffer[afx->buffer_pos++];
+            for(; n < size && afx->buffer_pos < afx->buffer_len;)
+                buf[n++] = afx->buffer[afx->buffer_pos++];
 	    if( afx->buffer_pos >= afx->buffer_len )
 		afx->buffer_len = 0;
 	}
// Source: https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9

Detection Methods for CVE-2025-68973

Indicators of Compromise

  • Unexpected crashes or SIGABRT/SIGSEGV signals from gpg, gpgv, or gpg2 processes when handling armored input.
  • Presence of GnuPG packages with versions earlier than 2.4.9 (or 2.2.51 in the ExtendedLTS branch) on production systems.
  • Receipt of OpenPGP .asc files with anomalously sized armor blocks or padding that triggers parser errors.

Detection Strategies

  • Inventory installed GnuPG binaries with gpg --version and compare against fixed releases 2.4.9 and 2.2.51.
  • Monitor automated signing and verification pipelines for non-zero exit codes or core dumps from gpg invocations.
  • Inspect mail gateways and code-signing workflows for armored payloads originating from untrusted senders.

Monitoring Recommendations

  • Enable core dump collection and ABRT-style crash reporting on hosts that decrypt or verify untrusted PGP content.
  • Forward process telemetry for gpg invocations to a centralized analytics platform and alert on abnormal child-process termination.
  • Track package management events for GnuPG upgrades to confirm fix deployment across the estate.

How to Mitigate CVE-2025-68973

Immediate Actions Required

  • Upgrade GnuPG to 2.4.9 or later, or to 2.2.51 or later on ExtendedLTS systems.
  • Apply distribution updates such as the Debian LTS Announcement for gnupg.
  • Audit CI/CD and release-signing systems to confirm they run patched GnuPG before processing third-party armored input.

Patch Information

The upstream fix replaces the double-incrementing for loop in armor_filter so n advances only inside the loop body. The patch is committed in gpg/gnupg commit 115d138b and is included in the 2.2.51 release per the version comparison 2.2.50...2.2.51. Additional context is available in the Openwall oss-security update and the GPG Fail Analysis.

Workarounds

  • Restrict GnuPG processing of armored input to trusted sources until patches are deployed.
  • Run gpg under sandboxing (for example, bubblewrap, firejail, or systemd unit hardening) to limit the impact of memory corruption.
  • Prefer binary OpenPGP input over ASCII-armored input in automated pipelines where feasible, since the flaw is in the armor parser path.
bash
# Verify the installed GnuPG version and upgrade on Debian-based systems
gpg --version | head -n 1
sudo apt-get update
sudo apt-get install --only-upgrade gnupg gnupg2 gpgv
gpg --version | head -n 1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechGnupg

  • SeverityHIGH

  • CVSS Score7.0

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-675

  • CWE-787
  • Technical References
  • GitHub Source Code Reference

  • GPG Fail Analysis

  • CCC Presentation on Vulnerabilities

  • Hacker News Discussion

  • Openwall OSS Security Announcement

  • Debian LTS Announce Message
  • Vendor Resources
  • GitHub Commit Log

  • GitHub Version Comparison

  • Openwall OSS Security Update
  • Related CVEs
  • CVE-2026-24881: GnuPG Buffer Overflow Vulnerability

  • CVE-2026-24882: GnuPG Buffer Overflow Vulnerability

  • CVE-2026-24883: GnuPG Denial of Service Vulnerability

  • CVE-2021-33560: Libgcrypt Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English