Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6762 | In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS." |
Ubuntu USN |
USN-7412-1 | GnuPG vulnerability |
Ubuntu USN |
USN-7412-3 | GnuPG vulnerability |
Fri, 10 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:* |
Thu, 20 Mar 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | gnupg: verification DoS due to a malicious subkey in the keyring | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 19 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Mar 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS." | |
| Weaknesses | CWE-754 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T20:49:22.417Z
Reserved: 2025-03-19T00:00:00.000Z
Link: CVE-2025-30258
Updated: 2025-03-19T20:48:51.269Z
Status : Analyzed
Published: 2025-03-19T20:15:20.140
Modified: 2025-10-16T16:53:07.557
Link: CVE-2025-30258
OpenCVE Enrichment
Updated: 2025-07-12T15:26:05Z
EUVD
Ubuntu USN