SUSE alert SUSE-SU-2026:0450-1 (munge)
| From: | OPENSUSE-SECURITY-UPDATES <null@suse.de> | |
| To: | security-announce@lists.opensuse.org | |
| Subject: | SUSE-SU-2026:0450-1: important: Security update for munge | |
| Date: | Wed, 11 Feb 2026 20:32:44 -0000 | |
| Message-ID: | <177084196432.12113.7165777661669826158@smelt2.prg2.suse.org> | |
| Archive-link: | Article |
# Security update for munge Announcement ID: SUSE-SU-2026:0450-1 Release Date: 2026-02-11T15:46:24Z Rating: important References: * bsc#1246088 * bsc#1257651 Cross-References: * CVE-2026-25506 CVSS scores: * CVE-2026-25506 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L * CVE-2026-25506 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for munge fixes the following issues: * CVE-2026-25506: buffer overflow in message unpacking (bsc#1257651). * Make logrotate work on munge log as user munge. This prevents a local privilege escalation (bsc#1246088). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-450=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-450=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-450=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-450=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-450=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libmunge2-debuginfo-0.5.15-150400.18.10.1 * libmunge2-0.5.15-150400.18.10.1 * munge-debugsource-0.5.15-150400.18.10.1 * munge-0.5.15-150400.18.10.1 * munge-debuginfo-0.5.15-150400.18.10.1 * munge-devel-0.5.15-150400.18.10.1 * openSUSE Leap 15.4 (x86_64) * munge-devel-32bit-0.5.15-150400.18.10.1 * libmunge2-32bit-0.5.15-150400.18.10.1 * libmunge2-32bit-debuginfo-0.5.15-150400.18.10.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libmunge2-64bit-0.5.15-150400.18.10.1 * munge-devel-64bit-0.5.15-150400.18.10.1 * libmunge2-64bit-debuginfo-0.5.15-150400.18.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libmunge2-debuginfo-0.5.15-150400.18.10.1 * libmunge2-0.5.15-150400.18.10.1 * munge-debugsource-0.5.15-150400.18.10.1 * munge-0.5.15-150400.18.10.1 * munge-debuginfo-0.5.15-150400.18.10.1 * munge-devel-0.5.15-150400.18.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libmunge2-debuginfo-0.5.15-150400.18.10.1 * libmunge2-0.5.15-150400.18.10.1 * munge-debugsource-0.5.15-150400.18.10.1 * munge-0.5.15-150400.18.10.1 * munge-debuginfo-0.5.15-150400.18.10.1 * munge-devel-0.5.15-150400.18.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libmunge2-debuginfo-0.5.15-150400.18.10.1 * libmunge2-0.5.15-150400.18.10.1 * munge-debugsource-0.5.15-150400.18.10.1 * munge-0.5.15-150400.18.10.1 * munge-debuginfo-0.5.15-150400.18.10.1 * munge-devel-0.5.15-150400.18.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libmunge2-debuginfo-0.5.15-150400.18.10.1 * libmunge2-0.5.15-150400.18.10.1 * munge-debugsource-0.5.15-150400.18.10.1 * munge-0.5.15-150400.18.10.1 * munge-debuginfo-0.5.15-150400.18.10.1 * munge-devel-0.5.15-150400.18.10.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25506.html * https://bugzilla.suse.com/show_bug.cgi?id=1246088 * https://bugzilla.suse.com/show_bug.cgi?id=1257651
Attachment: None (type=text/html)
(HTML attachment elided)
