{"id":"UBUNTU-CVE-2026-24882","details":"In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.","modified":"2026-02-10T08:14:11.664395Z","published":"2026-01-27T19:16:00Z","withdrawn":"2026-02-10T05:31:25Z","upstream":["CVE-2026-24882"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24882"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-24882"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2026/01/27/8"}],"affected":[{"package":{"name":"gnupg2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/gnupg2@2.4.4-2ubuntu17.4?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.40-1.1ubuntu1","2.4.4-2ubuntu7","2.4.4-2ubuntu15","2.4.4-2ubuntu16","2.4.4-2ubuntu17","2.4.4-2ubuntu17.2","2.4.4-2ubuntu17.3","2.4.4-2ubuntu17.4"],"ecosystem_specific":{"binaries":[{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"dirmngr"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gnupg"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gnupg-agent"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gnupg-l10n"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gnupg-utils"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gnupg2"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpg"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpg-agent"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpg-wks-client"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpg-wks-server"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpgconf"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpgsm"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpgv"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpgv-static"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"gpgv-win32"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"keyboxd"},{"binary_version":"2.4.4-2ubuntu17.4","binary_name":"scdaemon"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24882.json"}},{"package":{"name":"gnupg2","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/gnupg2@2.4.8-2ubuntu2.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.4-2ubuntu23","2.4.4-2ubuntu24","2.4.7-17ubuntu3","2.4.8-2ubuntu1","2.4.8-2ubuntu2","2.4.8-2ubuntu2.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"dirmngr"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gnupg"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gnupg-agent"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gnupg-l10n"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gnupg-utils"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gnupg2"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpg"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpg-agent"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpg-wks-client"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpg-wks-server"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpgconf"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpgsm"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpgv"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"gpgv-static"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"scdaemon"},{"binary_version":"2.4.8-2ubuntu2.1","binary_name":"tpm2daemon"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24882.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}