munge-0.5.13-14.el9_7
エラータID: AXSA:2026-229:02
リリース日:
2026/02/27 Friday - 15:27
題名:
munge-0.5.13-14.el9_7
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- MUNGE の munged には、バッファオーバーフローに起因して暗号鍵が
漏洩してしまう問題があるため、ローカルの攻撃者により、大きすぎる
アドレス長フィールドを持つように細工されたメッセージの送信を介して、
なりすましによる特権昇格を可能とする脆弱性が存在します。
(CVE-2026-25506)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2026-25506
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
追加情報:
N/A
ダウンロード:
SRPMS
- munge-0.5.13-14.el9_7.src.rpm
MD5: 073e5497edfcb54aa122e5d9c2db3e58
SHA-256: daa6da081812eefe805d0243e58763344ebc5e9981f4807f25ff6c1d60afab4f
Size: 395.74 kB
Asianux Server 9 for x86_64
- munge-0.5.13-14.el9_7.x86_64.rpm
MD5: e457245d8b676fece7d208ecfde369b8
SHA-256: 8c7307543df18b0c5ef6e1747959a970d2a8d208e20c251470de6a0e5c6e4626
Size: 116.58 kB - munge-devel-0.5.13-14.el9_7.i686.rpm
MD5: 0949e834790ade75386650506d24a0d4
SHA-256: d5b31e4b290612fcf337587f7f3a03ea57dbfc0c65b85eef9e457f88566758e2
Size: 22.05 kB - munge-devel-0.5.13-14.el9_7.x86_64.rpm
MD5: 53e2a8b4eb9e8278324b9be6c65363fc
SHA-256: 11d8c2291188386738d4dc0f26f60dd181e7cfc4929deace990df475dd44ccfc
Size: 22.04 kB - munge-libs-0.5.13-14.el9_7.i686.rpm
MD5: 5e40df6b3fbd410da8630363612e0e57
SHA-256: db82f8b7c1b7903f2a22350842a513e337d49bc175bb2cc99d6e711f29579597
Size: 19.67 kB - munge-libs-0.5.13-14.el9_7.x86_64.rpm
MD5: d3725920504d0d9beb95bf5e05af7515
SHA-256: 278ba17969917b42dc61705c262de23cc5167ae789cb371501794790b41d218a
Size: 19.63 kB