Amazon Linux 1 (EOL) Security Advisory: ALAS-2018-1045
Advisory Released Date: 2018-06-27
Advisory Updated Date: 2025-04-23
A data validation flaw was found in the way gnupg processes file names during decryption and signature validation. An attacker may be able to inject messages into gnupg verbose message logging which may have the potential to bypass the integrity of signature authentication mechanisms and could have other unintended consequences if applications take action(s) based on parsed verbose gnupg output. (CVE-2018-12020)
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey. (CVE-2018-9234)
Affected Packages:
gnupg, gnupg2
Issue Correction:
Run yum update gnupg to update your system.
Run yum update gnupg2 to update your system.
i686:
gnupg-1.4.19-1.29.amzn1.i686
gnupg-debuginfo-1.4.19-1.29.amzn1.i686
gnupg2-smime-2.0.28-2.32.amzn1.i686
gnupg2-debuginfo-2.0.28-2.32.amzn1.i686
gnupg2-2.0.28-2.32.amzn1.i686
src:
gnupg-1.4.19-1.29.amzn1.src
gnupg2-2.0.28-2.32.amzn1.src
x86_64:
gnupg-1.4.19-1.29.amzn1.x86_64
gnupg-debuginfo-1.4.19-1.29.amzn1.x86_64
gnupg2-smime-2.0.28-2.32.amzn1.x86_64
gnupg2-debuginfo-2.0.28-2.32.amzn1.x86_64
gnupg2-2.0.28-2.32.amzn1.x86_64
2025-04-23: CVE-2018-9234 was added to this advisory.