munge-0.5.13-14.el9_7
エラータID: AXSA:2026-229:02
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.
Security Fix(es):
* MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-25506
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
Update packages.
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
N/A
SRPMS
- munge-0.5.13-14.el9_7.src.rpm
MD5: 073e5497edfcb54aa122e5d9c2db3e58
SHA-256: daa6da081812eefe805d0243e58763344ebc5e9981f4807f25ff6c1d60afab4f
Size: 395.74 kB
Asianux Server 9 for x86_64
- munge-0.5.13-14.el9_7.x86_64.rpm
MD5: e457245d8b676fece7d208ecfde369b8
SHA-256: 8c7307543df18b0c5ef6e1747959a970d2a8d208e20c251470de6a0e5c6e4626
Size: 116.58 kB - munge-devel-0.5.13-14.el9_7.i686.rpm
MD5: 0949e834790ade75386650506d24a0d4
SHA-256: d5b31e4b290612fcf337587f7f3a03ea57dbfc0c65b85eef9e457f88566758e2
Size: 22.05 kB - munge-devel-0.5.13-14.el9_7.x86_64.rpm
MD5: 53e2a8b4eb9e8278324b9be6c65363fc
SHA-256: 11d8c2291188386738d4dc0f26f60dd181e7cfc4929deace990df475dd44ccfc
Size: 22.04 kB - munge-libs-0.5.13-14.el9_7.i686.rpm
MD5: 5e40df6b3fbd410da8630363612e0e57
SHA-256: db82f8b7c1b7903f2a22350842a513e337d49bc175bb2cc99d6e711f29579597
Size: 19.67 kB - munge-libs-0.5.13-14.el9_7.x86_64.rpm
MD5: d3725920504d0d9beb95bf5e05af7515
SHA-256: 278ba17969917b42dc61705c262de23cc5167ae789cb371501794790b41d218a
Size: 19.63 kB