Red Hat Security Advisory RHSA-2001:063-02 - When modifying an unsuspecting user's private keyring, an attacker can cause a user to generate incorrect signatures for data. If a user generates both a correct and an incorrect signature for the same data, the different signatures can be used to compute the user's secret key. This is fixed in v1.0.5.
f0495b4a79ee9ef8d5489f6b7cff1ee6128afd0bad6c90054acfcb63d3f51f65