In GnuPG before 2.5.17, a long signature packet length...
Low severity
Unreviewed
Published
Jan 27, 2026
to the GitHub Advisory Database
•
Updated Jan 27, 2026
Description
Published by the National Vulnerability Database
Jan 27, 2026
Published to the GitHub Advisory Database
Jan 27, 2026
Last updated
Jan 27, 2026
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
References