Mandriva Linux Security Advisory MDKSA-2006-141 - An integer overflow vulnerability was discovered in gnupg where an attacker could create a carefully-crafted message packet with a large length that could cause gnupg to crash or possibly overwrite memory when opened.
fb416aba559619ae3c3c4346df15ead90bbf5c101d507c54275e9f1bc119aead
Debian Security Advisory 1141-1 - Evgeny Legerov discovered that overly large comments can crash gnupg, the GNU privacy guard.
60492423670cc72491ef4a144ffb37a567152ba29329729d073774027fb0364b
Debian Security Advisory 1140-1 - Evgeny Legerov discovered that overly large comments can crash gnupg.
67ef169c0e8da82562eebcd0186705924d9a14f8afb370351b7a7727f0f1a827
Ubuntu Security Notice USN-332-1 - Evgeny Legerov discovered that gnupg did not sufficiently check the validity of the comment and a control field. Specially crafted GPG data could cause a buffer overflow. This could be exploited to execute arbitrary code with the user's privileges if an attacker can trick an user into processing a malicious encrypted/signed document with gnupg.
6ee2044c87d8196115b9ed9cf39597199047605293f9b3fea86e4669ed913154