CVE-2026-24882
Vulnerability
CVE-2026-24882
GnuPG: GnuPG: Stack-based buffer overflow in tpm2daemon allows arbitrary code execution
ecosystem: redhat:6, redhat:7, redhat:8, redhat:9, redhat:10A flaw was found in GnuPG. This vulnerability, a stack-based buffer overflow, occurs in the `tpm2daemon` component when processing PKDECRYPT commands for cryptographic keys secured by a Trusted Platform Module (TPM). A local attacker could exploit this to execute unauthorized code, potentially gaining full control of the system, or disrupt its operation, leading to a denial of service.
References
- secalert@redhat.com: https://access.redhat.com/security/cve/CVE-2026-24882
- secalert@redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2433464
- secalert@redhat.com: https://dev.gnupg.org/T8045
- secalert@redhat.com: https://nvd.nist.gov/vuln/detail/CVE-2026-24882
- secalert@redhat.com: https://www.cve.org/CVERecord?id=CVE-2026-24882
- secalert@redhat.com: https://www.openwall.com/lists/oss-security/2026/01/27/8
type: vendor
source: secalert@redhat.com
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| AV | Local | |
|---|---|---|
| AC | Low | |
| PR | None | |
| UI | None | |
| S | Not Changed | |
| C | High | |
| I | High | |
| A | High |
source: secalert@redhat.com
Stack-based Buffer Overflow
source: secalert@redhat.com
published: 2026-01-27 18:40:18
modified: 2026-01-28 06:13:54
Detection
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-10:2f2e6eaf-40b2-9178-7687-8c20729a095c
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-els:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-extras-including-unpatched:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-including-unpatched:4e5832ca-37f6-ab04-e90c-f44c194c4327
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-6-supplementary:4e5832ca-37f6-ab04-e90c-f44c194c4327
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-extras-including-unpatched:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-including-unpatched:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-7-supplementary:a5d82b87-12e0-d8cf-fe19-bd383075b7a8
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-8-including-unpatched:32f71210-26fe-0b66-c6ee-ea579b914049
redhat-vex
OR
 
gnupg2
package type: binary
 
gnupg2-smime
package type: binary
 
gnupg2
package type: source
tag: rhel-9-including-unpatched:414a5c6b-7229-12e8-4049-8e3b509f8f2a
Data Sources
- RedHat Enterprise Linux CSAF VEX
redhat-vex