PT-2026-7436 · Munge +1 · Munge +1

Titouan Lazard

·

Published

2026-01-01

·

Updated

2026-02-16

·

CVE-2026-25506

CVSS v3.1
7.7
VectorAV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
Name of the Vulnerable Software and Affected Versions MUNGE versions 0.5.0 through 0.5.17
Description MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service used for creating and validating user credentials, particularly in High-Performance Computing (HPC) clusters utilizing Slurm. A buffer overflow exists in the
munged
daemon, specifically within the
 msg unpack
function when processing messages. This flaw allows a local attacker to potentially leak cryptographic key material from process memory by sending a crafted message with an oversized address length field. Successful exploitation could enable the attacker to forge MUNGE credentials, potentially gaining unauthorized access and privileges, including root access, to services relying on MUNGE authentication. The vulnerability involves a heap buffer overflow where a value in the
m->addr len
field is used as the copy length, allowing up to 255 bytes to be written into a 4-byte structure. This can overwrite heap objects and potentially control memory within the
munged
process.
Recommendations MUNGE versions prior to 0.5.18 are affected. Update to MUNGE version 0.5.18 or later to address this issue.

Exploit

Fix

LPE

Memory Corruption

Weakness Enumeration

Related Identifiers

CVE-2026-25506
GHSA-R9CR-JF4V-75GH
SUSE-SU-2026:0448-1
SUSE-SU-2026:0450-1
SUSE-SU-2026:0451-1
SUSE-SU-2026:0484-1
USN-8040-1

Affected Products

Linuxmint
Munge