DEBIAN-CVE-2026-24882

Source
https://security-tracker.debian.org/tracker/CVE-2026-24882
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24882.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-24882
Upstream
Published
2026-01-27T19:16:16.670Z
Modified
2026-02-07T10:16:42.273050Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.

References

Affected packages

Debian:13 / gnupg2

Package

Name
gnupg2
Purl
pkg:deb/debian/gnupg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4.7-21
2.4.7-21+deb13u1
2.4.8-1
2.4.8-2
2.4.8-3
2.4.8-4
2.4.8-5
2.4.8-6
2.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24882.json"

Debian:14 / gnupg2

Package

Name
gnupg2
Purl
pkg:deb/debian/gnupg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4.7-21
2.4.8-1
2.4.8-2
2.4.8-3
2.4.8-4
2.4.8-5
2.4.8-6
2.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24882.json"