The read_binary function in buffer.c in pgpdump before 0.30 allows context-dependent attackers to cause a denial of service (infinite loop and CPU consumption) via crafted input, as demonstrated by the \xa3\x03 string.
https://github.com/kazu-yamamoto/pgpdump/pull/16
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184689.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184617.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183750.html