CVE Vulnerabilities

CVE-2026-24883

NULL Pointer Dereference

Published: Jan 27, 2026 | Modified: Feb 06, 2026
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
GnupgGnupg2.5.13 (including)2.5.17 (excluding)
Gpg4winGpg4win5.0.0 (including)5.0.1 (excluding)
Gnupg2Ubuntuupstream*

Potential Mitigations

References