Denial of Service Vulnerability in GnuPG Affects Multiple Versions
CVE-2026-24883

3.7LOW

Key Information:

Vendor

Gnupg

Status
Vendor
CVE Published:
27 January 2026

What is CVE-2026-24883?

In GnuPG versions prior to 2.5.17, a vulnerability exists where a long signature packet length causes the parse_signature function to succeed but results in a NULL value being returned in sig->data[]. This flaw can lead to severe instability in the application, potentially causing it to crash. Users are advised to update to the latest version to mitigate this issue.

Affected Version(s)

GnuPG 2.5.3 < 2.5.17

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.