File tree Expand file tree Collapse file tree 3 files changed +27
-0
lines changed
Expand file tree Collapse file tree 3 files changed +27
-0
lines changed Original file line number Diff line number Diff line change 11| Date | Title | Contents/Link | Risk |
22| -------------| -------------------------------------------------------| ---------------------| ---------------|
3+ | 2026-02-10 | CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026 -25506) | [ OSG-SEC-2026-02-10] ( ./vulns/OSG-SEC-2026-02-10.md ) | |
34| 2026-01-27 | CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026 -24811, CVE-2026 -24812) | [ OSG-SEC-2026-01-27] ( ./vulns/OSG-SEC-2026-01-27.md ) | |
45| 2025-12-04 | CRITICAL React Server Components Vulnerability (CVE-2025 -55182) | [ OSG-SEC-2025-12-04] ( ./vulns/OSG-SEC-2025-12-04.md ) | |
56| 2025-09-11 | linux-kernel: CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025 -38352 | [ OSG-SEC-2025-09-11] ( ./vulns/OSG-SEC-2025-09-11.md ) | |
Original file line number Diff line number Diff line change 1+ # OSG-SEC-2026-02-10 CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026 -25506)
2+
3+ Dear OSG Security Contacts,
4+
5+ MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, a local attacker cou>
6+
7+ ## IMPACTED VERSIONS:
8+ > = 0.5, <= 0.5.17
9+
10+ ## WHAT ARE THE VULNERABILITIES:
11+ An attacker who obtains this leaked key material could forge arbitrary MUNGE credentials to impersonate any user (includi>
12+
13+ ## MITIGATION
14+ As a precautionary measure, regenerate MUNGE keys on all systems after patching. Note that key regeneration requires stop>
15+
16+ ## WHAT YOU SHOULD DO:
17+ Site admins should upgrade to 0.5.18 or apply vendor-supported updates that include fixes for CVE-2026 -25506.
18+
19+ ## REFERENCES
20+ [ 1] https://nvd.nist.gov/vuln/detail/CVE-2026-25506
21+ [ 2] https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh
22+
23+ Please contact the OSG security team at security@osg-htc.org if you have any questions or concerns.
24+
25+ OSG Security Team
Original file line number Diff line number Diff line change 1212 - Overview : ' OSGSecurityAnnouncements.md'
1313 - Overview x86 vulnerabilities : ' OSGSecurityAnnouncements-x86.md'
1414- Announcement Details :
15+ - OSG-SEC-2026-02-10 CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026-25506) : ' ./vulns/OSG-SEC-2026-02-10.md'
1516 - OSG-SEC-2026-01-27 CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812) : ' ./vulns/OSG-SEC-2026-01-27.md'
1617 - OSG-SEC-2025-12-04 CRITICAL React Server Components Vulnerability (CVE-2025-55182) : ' ./vulns/OSG-SEC-2025-12-04.md'
1718 - OSG-SEC-2025-09-11 linux-kernel- CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025-38352 : ' ./vulns/OSG-SEC-2025-09-11.md'
You can’t perform that action at this time.
0 commit comments