[Git][security-tracker-team/security-tracker][master] Track fixed version via experimental for CVE-2026-24882/gnupg2

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Feb 22 09:11:04 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
33ded389 by Salvatore Bonaccorso at 2026-02-22T10:10:29+01:00
Track fixed version via experimental for CVE-2026-24882/gnupg2

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -10691,6 +10691,7 @@ CVE-2026-24883 (In GnuPG before 2.5.17, a long signature packet length causes pa
 	NOTE: https://dev.gnupg.org/T8049
 	NOTE: Introduced by: https://dev.gnupg.org/rG36dbca3e6944d13e75e96eace634e58a7d7e201d (gnupg-2.5.3)
 CVE-2026-24882 (In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2da ...)
+	[experimental] - gnupg2 2.4.9-2
 	- gnupg2 <unfixed> (bug #1126631)
 	[trixie] - gnupg2 <no-dsa> (Minor issue)
 	[bookworm] - gnupg2 <not-affected> (Vulnerable code introduced later)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33ded389efde6beb2b30dcf78ab5bc70ad244778

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33ded389efde6beb2b30dcf78ab5bc70ad244778
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260222/57d1ae75/attachment.htm>


More information about the debian-security-tracker-commits mailing list