PT-2026-7436 · Munge+2 · Munge+2

Titouan Lazard

·

Published

2026-01-01

·

Updated

2026-02-25

·

CVE-2026-25506

CVSS v3.1

7.8

High

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions MUNGE versions 0.5.0 through 0.5.17
Description MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service used by workload managers like Slurm. A buffer overflow exists in the munged daemon, specifically within the msg unpack function when processing messages. This allows a local attacker to potentially forge MUNGE credentials, leading to arbitrary code execution and potential privilege escalation to root. The vulnerability occurs when processing messages with an oversized address length field, corrupting the internal state of munged and enabling the extraction of the MAC subkey used for credential verification. The vulnerability has existed for approximately 20 years. Exploitation involves heap manipulation techniques like tcache poisoning and heap shaping.
Recommendations Update to version 0.5.18 or later.

Exploit

Fix

LPE

Memory Corruption

Weakness Enumeration

Related Identifiers

ALSA-2026:3032
ALSA-2026:3033
ALSA-2026:3034
BDU:2026-01902
CVE-2026-25506
GHSA-R9CR-JF4V-75GH
OESA-2026-1348
OPENSUSE-SU-2026:10178-1
RHSA-2026:2918
RHSA-2026:2923
RHSA-2026:2934
RHSA-2026:2949
RHSA-2026:2954
RHSA-2026:3010
RHSA-2026:3011
RHSA-2026:3012
RHSA-2026:3013
RHSA-2026:3032
RHSA-2026:3033
RHSA-2026:3034
SUSE-SU-2026:0448-1
SUSE-SU-2026:0450-1
SUSE-SU-2026:0451-1
SUSE-SU-2026:0484-1
USN-8040-1

Affected Products

Linuxmint
Munge
Ubuntu