Gentoo Security Advisory GLSA 200612-03 (gnupg)

Summary
The remote host is missing updates announced in advisory GLSA 200612-03.
Solution
All GnuPG users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '=app-crypt/gnupg-1.4*' http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200612-03 http://bugs.gentoo.org/show_bug.cgi?id=156476 http://bugs.gentoo.org/show_bug.cgi?id=156947
Insight
GnuPG is vulnerable to a buffer overflow and an erroneous function pointer dereference that can result in the execution of arbitrary code.