Vulnerability Description
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnupg | Gnupg | >= 2.5.13, < 2.5.17 |
| Gpg4Win | Gpg4Win | >= 5.0.0, < 5.0.1 |
Related Weaknesses (CWE)
References
- https://dev.gnupg.org/T8045ExploitProduct
- https://www.openwall.com/lists/oss-security/2026/01/27/8Mailing ListThird Party Advisory
FAQ
What is CVE-2026-24882?
CVE-2026-24882 is a vulnerability with a CVSS score of 8.4 (HIGH). In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
How severe is CVE-2026-24882?
CVE-2026-24882 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24882?
Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Gnupg, Gpg4Win Gpg4Win.