GnuPG version 1.0.5 has been released that fixes a few security
problems, including a vulnerability that makes it easier for an
attacker to recover your private key if they are able to steal your
5508a9ba6885b81dcd6918f973651140 7.1/RPMS/gnupg-1.0.5-1.2mdk.i586.rpm 6059e4707fedbf872917bbef60db7217 7.1/SRPMS/gnupg-1.0.5-1.2mdk.src.rpm
9537e80cd404b8d51187f0be098c2475 7.2/RPMS/gnupg-1.0.5-1.1mdk.i586.rpm 534054ba6e7fb7003d3b53c7bb0a96e5 7.2/SRPMS/gnupg-1.0.5-1.1mdk.src.rpm
95353d7d6ad2a2c614542f44b1a2bf1c 8.0/RPMS/gnupg-1.0.5-1.1mdk.i586.rpm 534054ba6e7fb7003d3b53c7bb0a96e5 8.0/SRPMS/gnupg-1.0.5-1.1mdk.src.rpm
Corporate Server 1.0.1
5508a9ba6885b81dcd6918f973651140 1.0.1/RPMS/gnupg-1.0.5-1.2mdk.i586.rpm 6059e4707fedbf872917bbef60db7217 1.0.1/SRPMS/gnupg-1.0.5-1.2mdk.src.rpm
To upgrade automatically, use MandrivaUpdate.
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.