{"id":"USN-5503-2","summary":"gnupg, gnupg2 vulnerability","details":"USN-5503-1 fixed a vulnerability in GnuPG. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\n Demi Marie Obenour discovered that GnuPG incorrectly handled injection in\n the status message. A remote attacker could possibly use this issue to\n forge signatures.\n","modified":"2026-02-10T04:42:41Z","published":"2022-07-12T12:27:08Z","related":["UBUNTU-CVE-2022-34903"],"upstream":["CVE-2022-34903","UBUNTU-CVE-2022-34903"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5503-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-34903"}],"affected":[{"package":{"name":"gnupg","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.16-1ubuntu2.6+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.16-1ubuntu2.6+esm1"}]}],"versions":["1.4.14-1ubuntu2","1.4.15-1.1ubuntu1","1.4.15-1.1ubuntu2","1.4.15-2ubuntu1","1.4.16-1ubuntu1","1.4.16-1ubuntu2","1.4.16-1ubuntu2.1","1.4.16-1ubuntu2.3","1.4.16-1ubuntu2.4","1.4.16-1ubuntu2.5","1.4.16-1ubuntu2.6"],"ecosystem_specific":{"binaries":[{"binary_name":"gnupg","binary_version":"1.4.16-1ubuntu2.6+esm1"},{"binary_name":"gnupg-curl","binary_version":"1.4.16-1ubuntu2.6+esm1"},{"binary_name":"gpgv","binary_version":"1.4.16-1ubuntu2.6+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34903"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5503-2.json"}},{"package":{"name":"gnupg","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg@1.4.20-1ubuntu3.3+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.20-1ubuntu3.3+esm2"}]}],"versions":["1.4.18-7ubuntu1","1.4.19-6ubuntu1","1.4.20-1ubuntu1","1.4.20-1ubuntu2","1.4.20-1ubuntu3","1.4.20-1ubuntu3.1","1.4.20-1ubuntu3.2","1.4.20-1ubuntu3.3"],"ecosystem_specific":{"binaries":[{"binary_name":"gnupg","binary_version":"1.4.20-1ubuntu3.3+esm2"},{"binary_name":"gnupg-curl","binary_version":"1.4.20-1ubuntu3.3+esm2"},{"binary_name":"gpgv","binary_version":"1.4.20-1ubuntu3.3+esm2"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34903"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5503-2.json"}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.1.11-6ubuntu2.1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.11-6ubuntu2.1+esm1"}]}],"versions":["2.0.28-3ubuntu1","2.0.28-3ubuntu2","2.1.11-6ubuntu1","2.1.11-6ubuntu2","2.1.11-6ubuntu2.1"],"ecosystem_specific":{"binaries":[{"binary_name":"dirmngr","binary_version":"2.1.11-6ubuntu2.1+esm1"},{"binary_name":"gnupg-agent","binary_version":"2.1.11-6ubuntu2.1+esm1"},{"binary_name":"gnupg2","binary_version":"2.1.11-6ubuntu2.1+esm1"},{"binary_name":"gpgsm","binary_version":"2.1.11-6ubuntu2.1+esm1"},{"binary_name":"gpgv2","binary_version":"2.1.11-6ubuntu2.1+esm1"},{"binary_name":"scdaemon","binary_version":"2.1.11-6ubuntu2.1+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34903"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5503-2.json"}}],"schema_version":"1.7.3"}