Description of Problem:
GPG 1.0.5 and prior versions are vulnerable to format string exploits in
non-batch mode. 1.0.6 fixes this, according to the <A
HREF="http://www.gnupg.org/whatsnew.html#rn20010529">GnuPG web page</A>.
Presumably a more informative announcement from Werner is forthcoming....
Exploits for this have now been posted to bugtraq
An errata packages is being prepped.