The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html
seclists.org/bugtraq/2016/Apr/99
github.com/kazu-yamamoto/pgpdump/pull/16
www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-030.txt