|
|
Message-ID: <05b52c22-8676-47aa-965d-c2e8194e451d@gmail.com> Date: Tue, 10 Feb 2026 10:25:32 -0800 From: Chris Dunlap <chris.m.dunlap@...il.com> To: oss-security@...ts.openwall.com Subject: CVE-2026-25506: MUNGE 0.5-0.5.17 buffer overflow allowing key leakage A buffer overflow vulnerability in MUNGE allows a local attacker to leak cryptographic key material from the munged daemon process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. In HPC environments where workload managers and other services use MUNGE for authentication, forged credentials could potentially enable privilege escalation. There is no indication this vulnerability is being exploited in the wild. The vulnerability was discovered during a security audit and responsibly disclosed. CVE-2026-25506 Severity: High (CVSS 7.7) Attack Vector: Local Affected: MUNGE 0.5 through 0.5.17 Fixed: MUNGE 0.5.18 Release: https://github.com/dun/munge/releases/tag/munge-0.5.18 Advisory: https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh Users should upgrade to MUNGE 0.5.18 or apply vendor-supported updates that include fixes for CVE-2026-25506. Sites should schedule appropriate maintenance windows to regenerate MUNGE keys after patching. See the advisory for complete mitigation guidance. Reported by Titouan Lazard (LEXFO). Chris Dunlap MUNGE Maintainer PGP: A441 880C 3D4C 7C36 C5DD 41E1 3B7E CB2B 30DE 0871 Key: https://github.com/dun.gpg Download attachment "OpenPGP_0x3B7ECB2B30DE0871.asc" of type "application/pgp-keys" (4773 bytes) Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.