Package name gnupg
Date March 8th, 2007
Advisory ID MDKSA-2007:059
Affected versions CS3.0, MNF2.0, 2006.0, 2007.0, CS4.0
Synopsis Updated gnupg packages provide enhanced forgery detection

Problem Description

GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components. This could allow a remote
attacker to forge the contents of an email message without detection.

GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.

Updated Packages

Corporate Server 3.0

 36afcf2ffb12348fccdfba01b485d7fc  corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm 
 ec3c9d7bf56e941e2f92a92caa8ac812  corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 250e2ef0d26f6d51aa175e32c04e29d0  corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm 
 ec3c9d7bf56e941e2f92a92caa8ac812  corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

Multi Network Firewall 2.0

 014a4338ad09dca79149509a1a0a2050  mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm 
 d513a1498ccd2ee5661fb6a9e80c5230  mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm

Mandriva Linux 2006

 ec697754fca080fa53c6c486cd91ba8c  2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm 
 f30ab12655598264c10cee92ed76c951  2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 845bfd1f359b7866e73ab2eb8b30b8fe  2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm 
 f30ab12655598264c10cee92ed76c951  2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

Mandriva Linux 2007

 c1b40e8866482c368aab5df228093ab3  2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm
 9dbf1a7a48aecb2ece048b47f4c7ade9  2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm
 3809f32ed3708606e6318fb7feed230d  2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm 
 62d991ccd15ca77ed37ccd4ca1bedba7  2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
 31357e977acd83d777df2d77c22094f6  2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 d5339dd2bc4146dd18c2ab3b4eca028d  2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm
 608bd0a86d6f83927466f23e7d73fa8d  2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm
 915d2d203fa41ce12bc661d1a89d563b  2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm 
 62d991ccd15ca77ed37ccd4ca1bedba7  2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
 31357e977acd83d777df2d77c22094f6  2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

Corporate Server 4.0

 e39b79ee6122b17eaefa4abb7eec8d05  corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm 
 16926c5d72457c65d89124c1ebd7d0b9  corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

Corporate Server 4.0/X86_64

 810b054fed4d7c0b2c8605bb7c3efdca  corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm 
 16926c5d72457c65d89124c1ebd7d0b9  corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.