Bug 2433480 (CVE-2026-24881) - CVE-2026-24881 GnuPG: GnuPG: Remote code execution and denial of service via crafted CMS EnvelopedData message [NEEDINFO]
Summary: CVE-2026-24881 GnuPG: GnuPG: Remote code execution and denial of service via ...
Keywords:
Status: NEW
Alias: CVE-2026-24881
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2433666 2433670 2433672 2433673
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 19:02 UTC by OSIDB Bzimport
Modified: 2026-02-03 08:41 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
jjelen: needinfo? (prodsec-dev)


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-27 19:02:54 UTC
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

Comment 2 Jakub Jelen 2026-01-28 16:50:46 UTC
This does not affect any RHEL nor Fedora versions. Per https://dev.gnupg.org/T8044#211814

> Affected versions are 2.5.13 to 2.5.16. The other branches are not affected.

Please, adjust accordingly. I will close the Fedora trackers.

Comment 3 MikeAnders 2026-02-03 03:39:24 UTC
Based on https://access.redhat.com/security/cve/cve-2026-24881 RHEL seem to be affected.

Comment 4 Jakub Jelen 2026-02-03 08:41:22 UTC
(In reply to MikeAnders from comment #3)
> Based on https://access.redhat.com/security/cve/cve-2026-24881 RHEL seem to
> be affected.

Thats obviously wrong. See the affected versions on the openwall list:

https://www.openwall.com/lists/oss-security/2026/01/27/8

The only part affecting RHEL10 is the tpm2daemon bug, but that one is tracked separately as CVE-2026-24882.


Note You need to log in before you can comment on or make changes to this bug.