CVE-2025-30258

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."

Open
LOW (1.6)
  • logo

    System detected CVE-2025-30258 with a risk of 0.85

  • S

    Sebastian Kawelke updated the risk assessment from 0.85 to 1.65

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 0.85 to 1.65

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • logo

    System fixed CVE-2025-30258

  • logo

    System fixed CVE-2025-30258

  • logo

    System detected CVE-2025-30258 with a risk of 1.65

Add a comment

Mark as False Positive
Last calculated at:

Affected component

debian/gnupg2

Installed version:
2.2.40
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5