PT-2026-7436 · Munge +1 · Munge +1
Titouan Lazard
·
Published
2026-01-01
·
Updated
2026-02-16
·
CVE-2026-25506
CVSS v3.1
7.7
7.7
High
| Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
MUNGE versions 0.5.0 through 0.5.17
Description
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service used for creating and validating user credentials, particularly in High-Performance Computing (HPC) clusters utilizing Slurm. A buffer overflow exists in the
munged daemon, specifically within the msg unpack function when processing messages. This flaw allows a local attacker to potentially leak cryptographic key material from process memory by sending a crafted message with an oversized address length field. Successful exploitation could enable the attacker to forge MUNGE credentials, potentially gaining unauthorized access and privileges, including root access, to services relying on MUNGE authentication. The vulnerability involves a heap buffer overflow where a value in the m->addr len field is used as the copy length, allowing up to 255 bytes to be written into a 4-byte structure. This can overwrite heap objects and potentially control memory within the munged process.Recommendations
MUNGE versions prior to 0.5.18 are affected.
Update to MUNGE version 0.5.18 or later to address this issue.
Exploit
Fix
LPE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-25506
GHSA-R9CR-JF4V-75GH
SUSE-SU-2026:0448-1
SUSE-SU-2026:0450-1
SUSE-SU-2026:0451-1
SUSE-SU-2026:0484-1
USN-8040-1
Affected Products
Linuxmint
Munge
References · 31
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25506.json⭐ 2475 🔗 560 · Exploit
- https://security-tracker.debian.org/tracker/CVE-2026-25506 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2026-25506 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2026:0450-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2026:0451-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2026:0448-1 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-8040-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2026:0484-1 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2026-25506 · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2026-25506 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-25506 · Security Note
- https://osv.dev/vulnerability/USN-8040-1 · Vendor Advisory
- https://ubuntu.com/security/CVE-2026-25506 · Vendor Advisory
- https://osv.dev/vulnerability/DEBIAN-CVE-2026-25506 · Vendor Advisory
- https://github.com/dun/munge/releases/tag/munge-0.5.18⭐ 293 🔗 50 · Note