Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24882

Опубликовано: 27 янв. 2026
Источник: debian

Описание

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupg2unfixedpackage
gnupg2no-dsatrixiepackage
gnupg2not-affectedbookwormpackage
gnupg2not-affectedbullseyepackage

Примечания

  • https://dev.gnupg.org/T8045

  • Introduced after: https://github.com/gpg/gnupg/commit/62a7854816b8f3661fb41f05463289e5b96663ee (Beta-2.3.0-beta1655)

Связанные уязвимости

CVSS3: 8.4
ubuntu
11 дней назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

CVSS3: 8.4
nvd
11 дней назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

CVSS3: 8.4
github
11 дней назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

suse-cvrf
9 дней назад

Security update for gpg2