CVE-2025-30258
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
- T
Tim Bastin detected CVE-2025-30258 with a risk of 1.25
System updated the risk assessment from 1.25 to 0.62
System recalculated raw risk assessment
System updated the risk assessment from 0.62 to 1.25
System recalculated raw risk assessment
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
System
- T
Tim Bastin detected CVE-2025-30258 with a risk of 1.25
- T
Tim Bastin detected CVE-2025-30258 with a risk of 1.25
- T
Tim Bastin detected CVE-2025-30258 with a risk of 1.25
- T
Tim Bastin detected CVE-2025-30258 with a risk of 1.25
- T
Tim Bastin
System
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
- S
Sebastian Kawelke updated the risk assessment from 1.25 to 1.65
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System fixed CVE-2025-30258
System detected CVE-2025-30258 with a risk of 1.65
Add a comment
Affected component
debian/gnupg2