Advisories
Mandriva Advisories
|
![]() |
Problem Description |
GnuPG version 1.0.5 has been released that fixes a few security
problems, including a vulnerability that makes it easier for an
attacker to recover your private key if they are able to steal your
keyring.
Updated Packages |
Mandrakelinux 7.1
5508a9ba6885b81dcd6918f973651140 7.1/RPMS/gnupg-1.0.5-1.2mdk.i586.rpm 6059e4707fedbf872917bbef60db7217 7.1/SRPMS/gnupg-1.0.5-1.2mdk.src.rpm
Mandrakelinux 7.2
9537e80cd404b8d51187f0be098c2475 7.2/RPMS/gnupg-1.0.5-1.1mdk.i586.rpm 534054ba6e7fb7003d3b53c7bb0a96e5 7.2/SRPMS/gnupg-1.0.5-1.1mdk.src.rpm
Mandrakelinux 8.0
95353d7d6ad2a2c614542f44b1a2bf1c 8.0/RPMS/gnupg-1.0.5-1.1mdk.i586.rpm 534054ba6e7fb7003d3b53c7bb0a96e5 8.0/SRPMS/gnupg-1.0.5-1.1mdk.src.rpm
Corporate Server 1.0.1
5508a9ba6885b81dcd6918f973651140 1.0.1/RPMS/gnupg-1.0.5-1.2mdk.i586.rpm 6059e4707fedbf872917bbef60db7217 1.0.1/SRPMS/gnupg-1.0.5-1.2mdk.src.rpm
References |
http://www.gnupg.org/whatsnew.html#rn20010429
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.