USN-5503-1 fixed a vulnerability in GnuPG. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Demi Marie Obenour discovered that GnuPG incorrectly handled injection in the status message. A remote attacker could possibly use this issue to forge signatures.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.4.16-1ubuntu2.6+esm1",
"binary_name": "gnupg"
},
{
"binary_version": "1.4.16-1ubuntu2.6+esm1",
"binary_name": "gnupg-curl"
},
{
"binary_version": "1.4.16-1ubuntu2.6+esm1",
"binary_name": "gpgv"
}
]
}
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.4.20-1ubuntu3.3+esm2",
"binary_name": "gnupg"
},
{
"binary_version": "1.4.20-1ubuntu3.3+esm2",
"binary_name": "gnupg-curl"
},
{
"binary_version": "1.4.20-1ubuntu3.3+esm2",
"binary_name": "gpgv"
}
]
}
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "dirmngr"
},
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "gnupg-agent"
},
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "gnupg2"
},
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "gpgsm"
},
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "gpgv2"
},
{
"binary_version": "2.1.11-6ubuntu2.1+esm1",
"binary_name": "scdaemon"
}
]
}