In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
References
| Link | Resource |
|---|---|
| https://dev.gnupg.org/T7527 | Exploit Issue Tracking |
| https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 | Issue Tracking |
| https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html | Mailing List Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-19 20:15
Updated : 2025-10-16 16:53
NVD link : CVE-2025-30258
Mitre link : CVE-2025-30258
CVE.ORG link : CVE-2025-30258
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
