In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
References
| Link | Resource |
|---|---|
| https://dev.gnupg.org/T7527 | Exploit Issue Tracking |
| https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 | Issue Tracking |
| https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html | Mailing List Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Oct 2025, 14:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:* | |
| References | () https://dev.gnupg.org/T7527 - Exploit, Issue Tracking | |
| References | () https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 - Issue Tracking | |
| References | () https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html - Mailing List, Release Notes, Vendor Advisory | |
| First Time |
Gnupg
Gnupg gnupg |
|
| Summary |
|
19 Mar 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-19 20:15
Updated : 2025-10-16 16:53
NVD link : CVE-2025-30258
Mitre link : CVE-2025-30258
CVE.ORG link : CVE-2025-30258
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
