Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24882

Опубликовано: 27 янв. 2026
Источник: debian
EPSS Низкий

Описание

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupg2fixed2.4.9-2experimentalpackage
gnupg2unfixedpackage
gnupg2no-dsatrixiepackage
gnupg2not-affectedbookwormpackage
gnupg2not-affectedbullseyepackage

Примечания

  • https://dev.gnupg.org/T8045

  • Introduced after: https://github.com/gpg/gnupg/commit/62a7854816b8f3661fb41f05463289e5b96663ee (Beta-2.3.0-beta1655)

EPSS

Процентиль: 0%
0.00006
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
2 месяца назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

CVSS3: 8.4
redhat
2 месяца назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

CVSS3: 8.4
nvd
2 месяца назад

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

suse-cvrf
около 2 месяцев назад

Security update for gpg2

rocky
около 1 месяца назад

Important: gnupg2 security update

EPSS

Процентиль: 0%
0.00006
Низкий