Description

In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).

INFO

Published Date :

2026-01-27T18:43:18.883Z

Last Modified :

2026-01-28T15:52:11.076Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2026-24883 vulnerability.

Vendors Products
Gnupg
  • Gnupg
Gpg4win
  • Gpg4win
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact