CVE-2026-24882

EUVD-2026-4769
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
gnupggnupg
2.5.13 ≤
𝑥
< 2.5.17
gpg4wingpg4win
5.0.0 ≤
𝑥
< 5.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnupg2
bookworm
2.2.40-1.1+deb12u2
fixed
bullseye
2.2.27-2+deb11u2
fixed
bullseye (security)
2.2.27-2+deb11u3
fixed
forky
vulnerable
sid
vulnerable
trixie
no-dsa
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
dirmngr
suse enterprise desktop 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise sap 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP6
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP7
2.4.4-150600.3.15.1
fixed
gpg2
suse enterprise desktop 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise sap 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP6
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP7
2.4.4-150600.3.15.1
fixed
gpg2-lang
suse enterprise desktop 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise sap 15 SP7
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP6
2.4.4-150600.3.15.1
fixed
suse enterprise server 15 SP7
2.4.4-150600.3.15.1
fixed