In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
2026-01-27T19:16:16.823
2026-02-06T18:06:07.760
Analyzed
CVSSv3.1: 3.7 (LOW)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | gnupg | gnupg | < 2.5.17 | Yes |
| Application | gpg4win | gpg4win | < 5.0.1 | Yes |