Vulnerability Description
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnupg | Gnupg | >= 2.5.13, < 2.5.17 |
| Gpg4Win | Gpg4Win | >= 5.0.0, < 5.0.1 |
Related Weaknesses (CWE)
References
- https://dev.gnupg.org/T8049PatchProduct
- https://www.openwall.com/lists/oss-security/2026/01/27/8Mailing ListThird Party Advisory
FAQ
What is CVE-2026-24883?
CVE-2026-24883 is a vulnerability with a CVSS score of 3.7 (LOW). In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
How severe is CVE-2026-24883?
CVE-2026-24883 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24883?
Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Gnupg, Gpg4Win Gpg4Win.