CVE-2026-24881
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://dev.gnupg.org/T8044, https://www.openwall.com/lists/oss-security/2026/01/27/8, https://www.openwall.com/lists/oss-security/2026/01/27/8, https://dev.gnupg.org/T8044
