[Git][security-tracker-team/security-tracker][master] Track fixed version via experimental for CVE-2026-24882/gnupg2
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Feb 22 09:11:04 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
33ded389 by Salvatore Bonaccorso at 2026-02-22T10:10:29+01:00
Track fixed version via experimental for CVE-2026-24882/gnupg2
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10691,6 +10691,7 @@ CVE-2026-24883 (In GnuPG before 2.5.17, a long signature packet length causes pa
NOTE: https://dev.gnupg.org/T8049
NOTE: Introduced by: https://dev.gnupg.org/rG36dbca3e6944d13e75e96eace634e58a7d7e201d (gnupg-2.5.3)
CVE-2026-24882 (In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2da ...)
+ [experimental] - gnupg2 2.4.9-2
- gnupg2 <unfixed> (bug #1126631)
[trixie] - gnupg2 <no-dsa> (Minor issue)
[bookworm] - gnupg2 <not-affected> (Vulnerable code introduced later)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33ded389efde6beb2b30dcf78ab5bc70ad244778
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33ded389efde6beb2b30dcf78ab5bc70ad244778
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260222/57d1ae75/attachment.htm>
More information about the debian-security-tracker-commits
mailing list