RLSA-2026:2719

Source
https://errata.rockylinux.org/RLSA-2026:2719
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:2719.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:2719
Upstream
Published
2026-02-24T18:56:34.668877Z
Modified
2026-02-25T05:48:51.634497Z
Severity
  • 8.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: gnupg2 security update
Details

The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.

Security Fix(es):

  • GnuPG: GnuPG: Stack-based buffer overflow in tpm2daemon allows arbitrary code execution (CVE-2026-24882)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / gnupg2

Package

Name
gnupg2
Purl
pkg:rpm/rocky-linux/gnupg2?distro=rocky-linux-10&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.4.5-4.el10_1
Database specific
{
    "yum_repository": "BaseOS"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:2719.json"