Skip to content

Commit a985acb

Browse files
authored
Merge pull request #50 from MeghaMoncy/master
Updating to add OSG-SEC-2026-02-10 CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026-25506)
2 parents 01c2129 + af753c2 commit a985acb

File tree

3 files changed

+27
-0
lines changed

3 files changed

+27
-0
lines changed

docs/OSGSecurityAnnouncements.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
| Date | Title | Contents/Link | Risk |
22
|-------------|-------------------------------------------------------|---------------------|---------------|
3+
| 2026-02-10 | CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026-25506) | [OSG-SEC-2026-02-10](./vulns/OSG-SEC-2026-02-10.md) | |
34
| 2026-01-27 | CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812) | [OSG-SEC-2026-01-27](./vulns/OSG-SEC-2026-01-27.md) | |
45
| 2025-12-04 | CRITICAL React Server Components Vulnerability (CVE-2025-55182) | [OSG-SEC-2025-12-04](./vulns/OSG-SEC-2025-12-04.md) | |
56
| 2025-09-11 | linux-kernel: CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025-38352 | [OSG-SEC-2025-09-11](./vulns/OSG-SEC-2025-09-11.md) | |

docs/vulns/OSG-SEC-2026-02-10.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
# OSG-SEC-2026-02-10 CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026-25506)
2+
3+
Dear OSG Security Contacts,
4+
5+
MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, a local attacker cou>
6+
7+
## IMPACTED VERSIONS:
8+
>= 0.5, <= 0.5.17
9+
10+
## WHAT ARE THE VULNERABILITIES:
11+
An attacker who obtains this leaked key material could forge arbitrary MUNGE credentials to impersonate any user (includi>
12+
13+
## MITIGATION
14+
As a precautionary measure, regenerate MUNGE keys on all systems after patching. Note that key regeneration requires stop>
15+
16+
## WHAT YOU SHOULD DO:
17+
Site admins should upgrade to 0.5.18 or apply vendor-supported updates that include fixes for CVE-2026-25506.
18+
19+
## REFERENCES
20+
[1] https://nvd.nist.gov/vuln/detail/CVE-2026-25506
21+
[2] https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh
22+
23+
Please contact the OSG security team at security@osg-htc.org if you have any questions or concerns.
24+
25+
OSG Security Team

mkdocs.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ nav:
1212
- Overview: 'OSGSecurityAnnouncements.md'
1313
- Overview x86 vulnerabilities: 'OSGSecurityAnnouncements-x86.md'
1414
- Announcement Details:
15+
- OSG-SEC-2026-02-10 CRITICAL risk MUNGE buffer overflow vulnerability (CVE-2026-25506): './vulns/OSG-SEC-2026-02-10.md'
1516
- OSG-SEC-2026-01-27 CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812): './vulns/OSG-SEC-2026-01-27.md'
1617
- OSG-SEC-2025-12-04 CRITICAL React Server Components Vulnerability (CVE-2025-55182): './vulns/OSG-SEC-2025-12-04.md'
1718
- OSG-SEC-2025-09-11 linux-kernel- CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025-38352: './vulns/OSG-SEC-2025-09-11.md'

0 commit comments

Comments
 (0)