Is the opengpg implementation affected by the vulnerability described in the following article?
https://arstechnica.com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/
I realize it's a new codebase in go, written from scratch, but I want to be sure.