Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-30258

Опубликовано: 19 мар. 2025
Источник: redhat
CVSS3: 2.7
EPSS Низкий

Описание

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."

A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.

Отчет

This vulnerability is rated as LOW impact. This is because it exists in GnuPG's certificate import logic. When a user imports a crafted certificate containing a subkey with a missing/invalid backsig (binding signature proving subkey-primary key association) or malformed usage flags, GnuPG fails to isolate the invalid key material, corrupting internal key selection state. This prevents verification of legitimate signing keys which is a denial of service extending beyond the malicious certificate. Exploitation requires user action to import an untrusted certificate.

Меры по смягчению последствий

There is no available mitigation for this vulnerability. However as a general security procedure,users should exercise caution and avoid importing GnuPG certificates from untrusted or unverified sources. Only import certificates that are known to be legitimate and from trusted entities. Update to GnuPG version 2.5.5 or later to resolve this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gnupg2Fix deferred
Red Hat Enterprise Linux 6gnupg2Out of support scope
Red Hat Enterprise Linux 7gnupg2Out of support scope
Red Hat Enterprise Linux 8gnupg2Out of support scope
Red Hat Enterprise Linux 9gnupg2Fix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-754
https://bugzilla.redhat.com/show_bug.cgi?id=2353427gnupg: verification DoS due to a malicious subkey in the keyring

EPSS

Процентиль: 7%
0.00025
Низкий

2.7 Low

CVSS3

Связанные уязвимости

CVSS3: 2.7
ubuntu
около 1 года назад

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."

CVSS3: 2.7
nvd
около 1 года назад

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."

msrc
7 месяцев назад

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."

CVSS3: 2.7
debian
около 1 года назад

In GnuPG before 2.5.5, if a user chooses to import a certificate with ...

suse-cvrf
9 месяцев назад

Recommended update for gpg2

EPSS

Процентиль: 7%
0.00025
Низкий

2.7 Low

CVSS3