From:	 dburcaw@newhope.terraplex.com
To:	 yellowdog-updates@lists.yellowdoglinux.com
Subject: [yellowdog-updates] Yellow Dog Linux Security Advisory: YDU-20010725-6
Date:	 9 Aug 2001 21:42:44 -0000

Yellow Dog Linux Security Announcement
--------------------------------------

Package:	gnupg	
Issue Date: 	July 25, 2001
Priority:	high		
Advisory ID: 	YDU-20010725-6


1. 	Topic:

	gnupg has been updated to a fix
	format string vulnerability.
	

2. 	Problem:

	"Versions of GnuPG up to and including 1.0.5
	include a format string vulnerability.  In some cases,
	this can lead to compromise of an account being
	used to decrypt an encrypted file."
	(from Red Hat's security advisory)


3. 	Solution:

   	a) Updating via yup...
   	We suggest that you use the Yellow Dog Update Program (yup)
   	to keep your system up-to-date. The following command(s) will
   	automatically retrieve and install the fixed version of
   	this update onto your system:

   		yup update gnupg 

   	b) Updating manually...
   	The update can also be retrieved manually from our ftp site
   	below along with the rpm command that should be used to install
   	the update.  (Please use a mirror site)

   		ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.0/ppc/RPMS/
		rpm -Fvh gnupg-1.0.6-1.ppc.rpm 


4. Verification

MD5 checksum			  Package
--------------------------------  ----------------------------
a7cf6a1919c4b014ec6bde198160b216  SRPMS/gnupg-1.0.6-1.src.rpm
c58165522f0d30d437d8b1766662be6e  ppc/RPMS/gnupg-1.0.6-1.ppc.rpm

If you wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename


5. Misc.

Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more
information.

For information regarding the usage of yup, the Yellow Dog Update Program, see 
http://devel.yellowdoglinux.com/rp_yup.shtml