CVE-2026-24881
Vulnerability
CVE-2026-24881
GnuPG: GnuPG: Remote code execution and denial of service via crafted CMS EnvelopedData message
ecosystem: redhat:6, redhat:7, redhat:8, redhat:9, redhat:10A flaw was found in GnuPG. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. This message, containing an oversized wrapped session key, can cause a stack-based buffer overflow in the gpg-agent component. Successful exploitation may lead to a denial of service and potentially remote code execution.
References
- secalert@redhat.com: https://access.redhat.com/security/cve/CVE-2026-24881
- secalert@redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2433480
- secalert@redhat.com: https://dev.gnupg.org/T8044
- secalert@redhat.com: https://nvd.nist.gov/vuln/detail/CVE-2026-24881
- secalert@redhat.com: https://www.cve.org/CVERecord?id=CVE-2026-24881
- secalert@redhat.com: https://www.openwall.com/lists/oss-security/2026/01/27/8
type: vendor
source: secalert@redhat.com
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| AV | Network | |
|---|---|---|
| AC | High | |
| PR | None | |
| UI | None | |
| S | Not Changed | |
| C | High | |
| I | High | |
| A | High |
source: secalert@redhat.com
Stack-based Buffer Overflow
source: secalert@redhat.com
published: 2026-01-27 18:36:56
modified: 2026-01-28 09:19:39
Detection
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-10:2f2e6eaf-40b2-9178-7687-8c20729a095c
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-els:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-extras-including-unpatched:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-including-unpatched:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-supplementary:4e5832ca-37f6-ab04-e90c-f44c194c4327
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-extras-including-unpatched:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-including-unpatched:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-supplementary:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-8-including-unpatched:32f71210-26fe-0b66-c6ee-ea579b914049
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-9-including-unpatched:414a5c6b-7229-12e8-4049-8e3b509f8f2a
Data Sources
- RedHat Enterprise Linux CSAF VEX
redhat-vex