Количество 5
Количество 5
CVE-2026-24883
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
CVE-2026-24883
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
CVE-2026-24883
In GnuPG before 2.5.17, a long signature packet length causes parse_si ...
GHSA-7246-cvp4-g68w
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
openSUSE-SU-2026:20136-1
Security update for gpg2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-24883 In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). | CVSS3: 3.7 | 0% Низкий | 13 дней назад | |
CVE-2026-24883 In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). | CVSS3: 3.7 | 0% Низкий | 13 дней назад | |
CVE-2026-24883 In GnuPG before 2.5.17, a long signature packet length causes parse_si ... | CVSS3: 3.7 | 0% Низкий | 13 дней назад | |
GHSA-7246-cvp4-g68w In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). | CVSS3: 3.7 | 0% Низкий | 13 дней назад | |
openSUSE-SU-2026:20136-1 Security update for gpg2 | 11 дней назад |
Уязвимостей на страницу