Your submission was sent successfully! Close

USN-5503-2: GnuPG vulnerability

12 July 2022

GnuPG could allow forged signatures.



  • gnupg - GNU privacy guard - a free PGP replacement
  • gnupg2 - GNU privacy guard - a free PGP replacement


USN-5503-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Demi Marie Obenour discovered that GnuPG incorrectly handled injection in
the status message. A remote attacker could possibly use this issue to
forge signatures.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.


Related notices

  • USN-5503-1: gnupg-l10n, gpgv-static, gnupg-utils, gnupg2, gpg-agent, dirmngr, gnupg, gpg-wks-server, gpgv2, gpgconf, gnupg-agent, gpgv, gpgsm, scdaemon, gpg, gpgv-win32, gpg-wks-client