Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gpg4win
Gpg4win gpg4win |
|
| CPEs | cpe:2.3:a:gnupg:gnupg:*:*:*:*:-:*:*:* cpe:2.3:a:gpg4win:gpg4win:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gpg4win
Gpg4win gpg4win |
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:* |
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnupg
Gnupg gnupg |
|
| Vendors & Products |
Gnupg
Gnupg gnupg |
Wed, 28 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | GnuPG: GnuPG: Denial of service due to specially crafted signature packet | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 27 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-28T15:52:11.076Z
Reserved: 2026-01-27T18:43:18.620Z
Link: CVE-2026-24883
Updated: 2026-01-27T20:02:29.427Z
Status : Analyzed
Published: 2026-01-27T19:16:16.823
Modified: 2026-02-06T18:06:07.760
Link: CVE-2026-24883
OpenCVE Enrichment
Updated: 2026-04-18T02:00:10Z