Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3032 - Security Advisory
Issued:
2026-02-23
Updated:
2026-02-23

RHSA-2026:3032 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: munge security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for munge is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.

Security Fix(es):

  • MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x

Fixes

  • BZ - 2438715 - CVE-2026-25506 MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery

CVEs

  • CVE-2026-25506

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
munge-0.5.13-3.el8_10.src.rpm SHA-256: 0694cac30629a57ead56453c5b093bf7bea85b0bdf7e838f0ec03f3b135e9347
x86_64
munge-0.5.13-3.el8_10.x86_64.rpm SHA-256: b07e4ee57e80722d2dde4c7c0b5aadc37c36bacc5a4132fcf4f7ae52ff15c276
munge-debuginfo-0.5.13-3.el8_10.i686.rpm SHA-256: 7830a0657933a8b7080239386aee175be6a57968edb6c81442fcf051562efb0c
munge-debuginfo-0.5.13-3.el8_10.x86_64.rpm SHA-256: 8b9ca44e129fc5b90a590316a4dbb47855370f6cde4ff85395d93aa0a5ea563d
munge-debugsource-0.5.13-3.el8_10.i686.rpm SHA-256: d9a8d689254430f298059c0e4c8fa24d5ff2d67164da6da06f1352e2954983d0
munge-debugsource-0.5.13-3.el8_10.x86_64.rpm SHA-256: 8609eb7838f908cbe0b072c6ddbbb749d5c77776ff582a2eb30264da70a593a1
munge-libs-0.5.13-3.el8_10.i686.rpm SHA-256: 5dbf5516cc2872b1cee3e80fffb0ce35fbd778506dfa2a3e390e87a3830f4c8d
munge-libs-0.5.13-3.el8_10.x86_64.rpm SHA-256: 100af7a8d32bbb2baa0ba2fa7e756019c7d08f8572479126d32db68ff22b705b
munge-libs-debuginfo-0.5.13-3.el8_10.i686.rpm SHA-256: ed917681d373714a21a4bcdd7e14f1ae7dcc66be897ccf813ffedf586e906995
munge-libs-debuginfo-0.5.13-3.el8_10.x86_64.rpm SHA-256: 96e9962bdccd730413483797f4b46d8d9dcb24347dc3c795c9db1bfdf0251318

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
munge-0.5.13-3.el8_10.src.rpm SHA-256: 0694cac30629a57ead56453c5b093bf7bea85b0bdf7e838f0ec03f3b135e9347
s390x
munge-0.5.13-3.el8_10.s390x.rpm SHA-256: 2446bb97f96eea50cebd9ca1b9ee60a74fbda00ef3b9b8c8d842a6110a148c45
munge-debuginfo-0.5.13-3.el8_10.s390x.rpm SHA-256: 56b15a4d033e180f0aa1dc12d8eb11da0348cd87f44cab71468a88ea792f50dd
munge-debugsource-0.5.13-3.el8_10.s390x.rpm SHA-256: 2141efe1e1c15b128eb704e9d51779b4e3d569c73551df50878a911be795564f
munge-libs-0.5.13-3.el8_10.s390x.rpm SHA-256: 0d1a81f66978f39ece99740e8d553ff245c4d989fca1a36a1539783565d491ca
munge-libs-debuginfo-0.5.13-3.el8_10.s390x.rpm SHA-256: 30de6c025469c2adc7c5c30b969b2ef35fb508eedb3771215fcebf570e55dea9

Red Hat Enterprise Linux for Power, little endian 8

SRPM
munge-0.5.13-3.el8_10.src.rpm SHA-256: 0694cac30629a57ead56453c5b093bf7bea85b0bdf7e838f0ec03f3b135e9347
ppc64le
munge-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 98ecdb50f24ded25d633923deb163293557de27c71a234111f7752a1c56d4364
munge-debuginfo-0.5.13-3.el8_10.ppc64le.rpm SHA-256: a7903232e69ba297a261a23cd544f95229c884f1cbbbe32982328cbe9c22e074
munge-debugsource-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 873218347fd83696b2cf58509cc5eb03729a3b9afeca37cfeeea75af704464fa
munge-libs-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 4c23f527f13ebaf3ec1b8d827d3e1c7b0df06a9f61797a3d687458451099506b
munge-libs-debuginfo-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 7fe72399478dd039bb405190c771abce4229e5cf3ab40e376fee9a11c1159019

Red Hat Enterprise Linux for ARM 64 8

SRPM
munge-0.5.13-3.el8_10.src.rpm SHA-256: 0694cac30629a57ead56453c5b093bf7bea85b0bdf7e838f0ec03f3b135e9347
aarch64
munge-0.5.13-3.el8_10.aarch64.rpm SHA-256: 4d9871fdcbda30ed19899f21b253bdca2bd5e95b035dd69b0af8a60030340e87
munge-debuginfo-0.5.13-3.el8_10.aarch64.rpm SHA-256: 75cce45db0c9f813ec397a4c95b4032005717a82e3c7c63c99bd7c46a2d5d042
munge-debugsource-0.5.13-3.el8_10.aarch64.rpm SHA-256: 727569a9a3499aa575d086e657dbb971920322b61b9b6f71f8a0d9ccc53360e1
munge-libs-0.5.13-3.el8_10.aarch64.rpm SHA-256: 27fa8bdd08f6aaf2ee98157d63ede10cf949dd533ad56649187fed85871d7240
munge-libs-debuginfo-0.5.13-3.el8_10.aarch64.rpm SHA-256: bf6abccab3dce518690fd736b39669d485be4a73648ff4f589216fa0dbef36bb

Red Hat CodeReady Linux Builder for x86_64 8

SRPM
x86_64
munge-debuginfo-0.5.13-3.el8_10.i686.rpm SHA-256: 7830a0657933a8b7080239386aee175be6a57968edb6c81442fcf051562efb0c
munge-debuginfo-0.5.13-3.el8_10.x86_64.rpm SHA-256: 8b9ca44e129fc5b90a590316a4dbb47855370f6cde4ff85395d93aa0a5ea563d
munge-debugsource-0.5.13-3.el8_10.i686.rpm SHA-256: d9a8d689254430f298059c0e4c8fa24d5ff2d67164da6da06f1352e2954983d0
munge-debugsource-0.5.13-3.el8_10.x86_64.rpm SHA-256: 8609eb7838f908cbe0b072c6ddbbb749d5c77776ff582a2eb30264da70a593a1
munge-devel-0.5.13-3.el8_10.i686.rpm SHA-256: c76f114432200174376e1c572bc6a9e95d7c7b8a6f55c9d4951bb18a86b980fa
munge-devel-0.5.13-3.el8_10.x86_64.rpm SHA-256: 39259913a3d2c22b68fbc5f2966aa982f7fadc75ca8978c5417c2ce1efca54a4
munge-libs-debuginfo-0.5.13-3.el8_10.i686.rpm SHA-256: ed917681d373714a21a4bcdd7e14f1ae7dcc66be897ccf813ffedf586e906995
munge-libs-debuginfo-0.5.13-3.el8_10.x86_64.rpm SHA-256: 96e9962bdccd730413483797f4b46d8d9dcb24347dc3c795c9db1bfdf0251318

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM
ppc64le
munge-debuginfo-0.5.13-3.el8_10.ppc64le.rpm SHA-256: a7903232e69ba297a261a23cd544f95229c884f1cbbbe32982328cbe9c22e074
munge-debugsource-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 873218347fd83696b2cf58509cc5eb03729a3b9afeca37cfeeea75af704464fa
munge-devel-0.5.13-3.el8_10.ppc64le.rpm SHA-256: ed365a9c42aea307deb001a70771fbae3e3c46e52d7fc8c891a9bc9581ee8283
munge-libs-debuginfo-0.5.13-3.el8_10.ppc64le.rpm SHA-256: 7fe72399478dd039bb405190c771abce4229e5cf3ab40e376fee9a11c1159019

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM
aarch64
munge-debuginfo-0.5.13-3.el8_10.aarch64.rpm SHA-256: 75cce45db0c9f813ec397a4c95b4032005717a82e3c7c63c99bd7c46a2d5d042
munge-debugsource-0.5.13-3.el8_10.aarch64.rpm SHA-256: 727569a9a3499aa575d086e657dbb971920322b61b9b6f71f8a0d9ccc53360e1
munge-devel-0.5.13-3.el8_10.aarch64.rpm SHA-256: 2a58f85628f3ab022bff657657844902aacdc6432072b73f57f76e4bfb0f4f04
munge-libs-debuginfo-0.5.13-3.el8_10.aarch64.rpm SHA-256: bf6abccab3dce518690fd736b39669d485be4a73648ff4f589216fa0dbef36bb

Red Hat CodeReady Linux Builder for IBM z Systems 8

SRPM
s390x
munge-debuginfo-0.5.13-3.el8_10.s390x.rpm SHA-256: 56b15a4d033e180f0aa1dc12d8eb11da0348cd87f44cab71468a88ea792f50dd
munge-debugsource-0.5.13-3.el8_10.s390x.rpm SHA-256: 2141efe1e1c15b128eb704e9d51779b4e3d569c73551df50878a911be795564f
munge-devel-0.5.13-3.el8_10.s390x.rpm SHA-256: a1fb61da9b1a2af88c1ba1e03ab44dd0eddca8100d56108c94cabe7653d1593f
munge-libs-debuginfo-0.5.13-3.el8_10.s390x.rpm SHA-256: 30de6c025469c2adc7c5c30b969b2ef35fb508eedb3771215fcebf570e55dea9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility