vulnerability
Amazon Linux 2023: CVE-2025-30258: Low priority package update for gnupg2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 1 | (AV:L/AC:H/Au:N/C:N/I:N/A:P) | Mar 19, 2025 | Jul 30, 2025 | Jul 30, 2025 |
Severity
1
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:P)
Published
Mar 19, 2025
Added
Jul 30, 2025
Modified
Jul 30, 2025
Description
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.
A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.
Solutions
amazon-linux-2023-upgrade-gnupg2amazon-linux-2023-upgrade-gnupg2-debuginfoamazon-linux-2023-upgrade-gnupg2-debugsourceamazon-linux-2023-upgrade-gnupg2-minimalamazon-linux-2023-upgrade-gnupg2-minimal-debuginfoamazon-linux-2023-upgrade-gnupg2-smimeamazon-linux-2023-upgrade-gnupg2-smime-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.