CVE-2026-24883

NameCVE-2026-24883
DescriptionIn GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg2 (PTS)bullseye2.2.27-2+deb11u2fixed
bullseye (security)2.2.27-2+deb11u3fixed
bookworm2.2.40-1.1+deb12u2fixed
trixie2.4.7-21+deb13u1fixed
forky, sid2.4.8-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupg2source(unstable)(not affected)

Notes

- gnupg2 <not-affected> (Vulnerable code introduced later; bug #1126630)
https://dev.gnupg.org/T8049
Introduced by: https://dev.gnupg.org/rG36dbca3e6944d13e75e96eace634e58a7d7e201d (gnupg-2.5.3)

Search for package or bug name: Reporting problems