Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Redhat: GnuPG update Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
RedHat Linux A verification bug has been found in GnuPG versions up to and including 1.0.3.

                   Red Hat, Inc. Security Advisory

Synopsis:          Updated gnupg packages available
Advisory ID:       RHSA-2000:089-04
Issue date:        2000-10-18
Updated on:        2000-10-20
Product:           Red Hat Linux
Keywords:          gnupg signature
Cross references:  N/A

1. Topic:

Updated gnupg packages are now available for Red Hat Linux 6.2 and 7.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 7.0 - i386

3. Problem description:

A problem has been found in GnuPG versions (up to and including 1.0.3). 
Due to this problem, GnuPG may report files which have been signed with
multiple keys (one or more of which may be incorrect) to be valid even if
one of the signatures is invalid.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed  (http://bugzilla.Red for more info):

19312 - GnuPG signature verification bug

6. RPMs required:

Red Hat Linux 6.2:





Red Hat Linux 7.0:



7. Verification:

MD5 sum                           Package Name
db4be5be1d5b9643927d193096db3489  6.2/SRPMS/gnupg-1.0.4-4.6.x.src.rpm
204298ddaaa03d880099ee7c2129f8da  6.2/alpha/gnupg-1.0.4-4.6.x.alpha.rpm
7a8aecf95b78e5a94468426bb8cfafba  6.2/i386/gnupg-1.0.4-4.6.x.i386.rpm
427e64e2057c003c9f8e0fe05e72e168  6.2/sparc/gnupg-1.0.4-4.6.x.sparc.rpm
ee35a93aefd926f4b9528b371c08c584  7.0/SRPMS/gnupg-1.0.4-5.src.rpm
fc0d8aec076b4a9b8ed526a9ec5323a1  7.0/i386/gnupg-1.0.4-5.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:

Copyright(c) 2000 Red Hat, Inc.

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.