A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password.
References
| Link | Resource |
|---|---|
| http://ftp.gnu.org/gnu/recutils/ | Product |
| https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-65409.md | Exploit Third Party Advisory |
| https://lists.gnu.org/archive/html/bug-recutils/2025-10/msg00004.html | Mailing List Patch |
| https://www.gnu.org/software/recutils/ | Product |
| https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-65409.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-30 18:15
Updated : 2026-01-09 19:49
NVD link : CVE-2025-65409
Mitre link : CVE-2025-65409
CVE.ORG link : CVE-2025-65409
JSON object : View
Products Affected
gnu
- recutils
CWE
CWE-369
Divide By Zero
