Skip to content

Commit d7d430e

Browse files
authored
Merge pull request #48 from MeghaMoncy/master
Updating to add OSG-SEC-2026-01-27.md
2 parents aba0eff + 9f7d582 commit d7d430e

File tree

3 files changed

+29
-0
lines changed

3 files changed

+29
-0
lines changed

docs/OSGSecurityAnnouncements.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
| Date | Title | Contents/Link | Risk |
22
|-------------|-------------------------------------------------------|---------------------|---------------|
3+
| 2026-01-27 | CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812) | [OSG-SEC-2026-01-27](./vulns/OSG-SEC-2026-01-27.md) | |
34
| 2025-12-04 | CRITICAL React Server Components Vulnerability (CVE-2025-55182) | [OSG-SEC-2025-12-04](./vulns/OSG-SEC-2025-12-04.md) | |
45
| 2025-09-11 | linux-kernel: CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025-38352 | [OSG-SEC-2025-09-11](./vulns/OSG-SEC-2025-09-11.md) | |
56
| 2025-09-04 | linux-pam: Incomplete fix for CVE-2025-6020 (CVE-2025-8941) | [OSG-SEC-2025-09-04](./vulns/OSG-SEC-2025-09-04.md) | |

docs/vulns/OSG-SEC-2026-01-27.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# OSG-SEC-2026-01-27 CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812)
2+
3+
Dear OSG Security Contacts,
4+
5+
Two critical vulnerabilities, CVE-2026-24811 and CVE-2026-24812, have been identified in the ROOT framework, specifically within its bundled (builtins) version of the zlib library. ROOT is an open-source data analysis framework developed at CERN. It is the foundational software for high-energy physics.
6+
7+
## IMPACTED VERSIONS:
8+
All versions up to and including 6.36.00-rc1
9+
10+
## WHAT ARE THE VULNERABILITIES:
11+
The flaws reside in inffast.c (pointer arithmetic error) and inftrees.c (buffer overflow). Because these handle the decompression of data, an attacker can exploit them by providing a maliciously crafted .root file or compressed data packet. The initial compromise grants the privileges of the service user. This is not a vulnerability that allows privilege escalation.
12+
13+
## WHAT YOU SHOULD DO:
14+
15+
Upgrade to Version 6.36.00 (Stable) and higher.
16+
17+
## REFERENCES
18+
[1] https://nvd.nist.gov/vuln/detail/CVE-2026-24811
19+
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-24812
20+
[3] https://github.com/root-project/root/pull/18526
21+
[4] https://github.com/root-project/root/pull/18527
22+
[5] https://github.com/advisories/GHSA-fm67-x2fw-2g76
23+
24+
25+
Please contact the OSG security team at security@osg-htc.org if you have any questions or concerns.
26+
27+
OSG Security Team

mkdocs.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ nav:
1212
- Overview: 'OSGSecurityAnnouncements.md'
1313
- Overview x86 vulnerabilities: 'OSGSecurityAnnouncements-x86.md'
1414
- Announcement Details:
15+
- OSG-SEC-2026-01-27 CRITICAL ROOT Framework Remote Code Execution Vulnerability (CVE-2026-24811, CVE-2026-24812): './vulns/OSG-SEC-2026-01-27.md'
1516
- OSG-SEC-2025-12-04 CRITICAL React Server Components Vulnerability (CVE-2025-55182): './vulns/OSG-SEC-2025-12-04.md'
1617
- OSG-SEC-2025-09-11 linux-kernel- CRITICAL risk vulnerability allowing local privilege escalation,CVE-2025-38352: './vulns/OSG-SEC-2025-09-11.md'
1718
- OSG-SEC-2025-09-04 Linux pam Incomplete fix for CVE-2025-6020 (CVE-2025-8941): './vulns/OSG-SEC-2025-09-04.md'

0 commit comments

Comments
 (0)