info
discussion
exploit
solution
references
GNU Privacy Guard File Verification Security Vulnerability
An attacker can use readily available tools to exploit this issue.
Privacy Statement
Copyright 2010, SecurityFocus