In GnuPG before 2.5.17, a crafted CMS (S/MIME)...
High severity
Unreviewed
Published
Jan 27, 2026
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Jan 27, 2026
Published to the GitHub Advisory Database
Jan 27, 2026
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.
References