In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
{ "versions": [ { "introduced": "5.0.0" }, { "fixed": "5.0.1" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24883.json"
[ { "events": [ { "introduced": "2.5.13" }, { "fixed": "2.5.17" } ] } ]