Debian Security Advisory 1115-1 - Evgeny Legerov discovered that gnupg, the GNU privacy guard, a free PGP replacement contains an integer overflow that can cause a segmentation fault and possibly overwrite memory via a large user ID strings.
d8dcb40dc9ebe29b56d2b32b51d8bb85f9c64facc298108981828b8a327b2de5
Debian Security Advisory 1107-1 - Evgeny Legerov discovered that gnupg, the GNU privacy guard, a free PGP replacement contains an integer overflow that can cause a segmentation fault and possibly overwrite memory via a large user ID strings.
2c9454d390114cbdc832e9da53e0d01a244e8f26abe28c2730d72a01a772cff1
Ubuntu Security Notice 304-1 - Evgeny Legerov discovered that GnuPG did not sufficiently check overly large user ID packets. Specially crafted user IDs caused a buffer overflow. By tricking an user or remote automated system into processing a malicious GnuPG message, an attacker could exploit this to crash GnuPG or possibly even execute arbitrary code.
8ce403909a08d5842575ce2c355e64f139717df41eaa70e0dc91eebc2d07d874
Mandriva Linux Security Advisory MDKSA-2006-110 - A vulnerability was discovered in GnuPG 1.4.3 and 1.9.20 (and earlier) that could allow a remote attacker to cause gpg to crash and possibly overwrite memory via a message packet with a large length.
6d39442026efb5d025e888531595a681f8d6514b42c1143ec60f123907217b70