Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3034 - Security Advisory
Issued:
2026-02-23
Updated:
2026-02-23

RHSA-2026:3034 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: munge security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for munge is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.

Security Fix(es):

  • MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x

Fixes

  • BZ - 2438715 - CVE-2026-25506 MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery

CVEs

  • CVE-2026-25506

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 9

SRPM
munge-0.5.13-14.el9_7.src.rpm SHA-256: 8344060c3920abedc2cea117cc64816203af1468af67c26208886917d9ab5951
x86_64
munge-0.5.13-14.el9_7.x86_64.rpm SHA-256: 1d6647bc109a650dc1c3f0088389ad485141e054bbf9970f0aea90081580df2f
munge-debuginfo-0.5.13-14.el9_7.i686.rpm SHA-256: 8ef1a274be4e04cd7b3fc4cae379fc03d7771ff20c1725f8482f64596ed0f787
munge-debuginfo-0.5.13-14.el9_7.x86_64.rpm SHA-256: 3c9b04747f3612d54df3fe57764e180ce1264808cd25997ef1313b6fab379aad
munge-debugsource-0.5.13-14.el9_7.i686.rpm SHA-256: 64aac21577dc758b3c28ece27461155418bf6801fdb29225635abbe403f57b48
munge-debugsource-0.5.13-14.el9_7.x86_64.rpm SHA-256: 764b7f6def39ba61f8e2b11815f7ab719d591bec49d7ef70a76fc85f326ceabc
munge-libs-0.5.13-14.el9_7.i686.rpm SHA-256: 5ac444155cb906c7577bbf79af5e557575ea036c541ed3d2963027b0be39546b
munge-libs-0.5.13-14.el9_7.x86_64.rpm SHA-256: 5104748e58171c091a476fe28a2a87cc9253eb2168eb92018f6d0d5cb918dcf0
munge-libs-debuginfo-0.5.13-14.el9_7.i686.rpm SHA-256: 0c1429cd5b3ced1a185087f3b3182bce23749a58fe8345c227977f0275cf528b
munge-libs-debuginfo-0.5.13-14.el9_7.x86_64.rpm SHA-256: 8b7bdce93a74a4d371cd142056cb2637e2943b80c1edbfb884359f4a4ce14cf9

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
munge-0.5.13-14.el9_7.src.rpm SHA-256: 8344060c3920abedc2cea117cc64816203af1468af67c26208886917d9ab5951
s390x
munge-0.5.13-14.el9_7.s390x.rpm SHA-256: a5a70f0d89f4a2c31d1e48a049221a284e5b2f167a8faff14aaf01d2c351135f
munge-debuginfo-0.5.13-14.el9_7.s390x.rpm SHA-256: 5d943fdab459ec8c1aedf1c395b45170108c0772af9c5fe8442f8dc8e6eebd55
munge-debugsource-0.5.13-14.el9_7.s390x.rpm SHA-256: 52fa75e88ca180378e0deabef371efaa215bcf616c8ca41e4cdc91d6593b132c
munge-libs-0.5.13-14.el9_7.s390x.rpm SHA-256: f86e7921be6df3c1d015ddc0900639ff36691983d14fe0d90c6df6f504b37479
munge-libs-debuginfo-0.5.13-14.el9_7.s390x.rpm SHA-256: 60fee2d422ca9df00526962eb55a402bf115fd0d215deff69055327c3347c012

Red Hat Enterprise Linux for Power, little endian 9

SRPM
munge-0.5.13-14.el9_7.src.rpm SHA-256: 8344060c3920abedc2cea117cc64816203af1468af67c26208886917d9ab5951
ppc64le
munge-0.5.13-14.el9_7.ppc64le.rpm SHA-256: 04cfc3157a622388c447b795edcb8b2dcfccff739214d47682d557f653e8b589
munge-debuginfo-0.5.13-14.el9_7.ppc64le.rpm SHA-256: cd1fc043bb751ef772a43f04cc5e145f40257c340a53040158d9cf5f3bb03618
munge-debugsource-0.5.13-14.el9_7.ppc64le.rpm SHA-256: 66ece07fa0f2a6915cbdf24c601a4aced96b5b253153d530769551bb695385a6
munge-libs-0.5.13-14.el9_7.ppc64le.rpm SHA-256: 5fc937661f583c69aa83e38cb615c5cad5501ee334c30d525db3c6b9fd532131
munge-libs-debuginfo-0.5.13-14.el9_7.ppc64le.rpm SHA-256: f9fcaee8fef6da01031790bd1748a1a82a42474b66116b174b46dca2ecafa38b

Red Hat Enterprise Linux for ARM 64 9

SRPM
munge-0.5.13-14.el9_7.src.rpm SHA-256: 8344060c3920abedc2cea117cc64816203af1468af67c26208886917d9ab5951
aarch64
munge-0.5.13-14.el9_7.aarch64.rpm SHA-256: d38203039b9b185ca89599f4fcddb3aed1ad59638b68f44bef8c44779ff6d215
munge-debuginfo-0.5.13-14.el9_7.aarch64.rpm SHA-256: dba5850ff17eaf689c7c7c89c999d68d2169ffbc695711c3c67bbb93d753c839
munge-debugsource-0.5.13-14.el9_7.aarch64.rpm SHA-256: f21d01b8d339502b7227daef05699a729b979da30d0a6900dc807c3327e5ba70
munge-libs-0.5.13-14.el9_7.aarch64.rpm SHA-256: 5b5ed8afcdeed40256679d19612d6ef85d36eff6e86b15c9c975055cca776fa1
munge-libs-debuginfo-0.5.13-14.el9_7.aarch64.rpm SHA-256: 6c6bc59646dbe36d75f5ea06ead33d9ae5ef05ca8cd4e62c66b33147fb4d69b0

Red Hat CodeReady Linux Builder for x86_64 9

SRPM
x86_64
munge-debuginfo-0.5.13-14.el9_7.i686.rpm SHA-256: 8ef1a274be4e04cd7b3fc4cae379fc03d7771ff20c1725f8482f64596ed0f787
munge-debuginfo-0.5.13-14.el9_7.x86_64.rpm SHA-256: 3c9b04747f3612d54df3fe57764e180ce1264808cd25997ef1313b6fab379aad
munge-debugsource-0.5.13-14.el9_7.i686.rpm SHA-256: 64aac21577dc758b3c28ece27461155418bf6801fdb29225635abbe403f57b48
munge-debugsource-0.5.13-14.el9_7.x86_64.rpm SHA-256: 764b7f6def39ba61f8e2b11815f7ab719d591bec49d7ef70a76fc85f326ceabc
munge-devel-0.5.13-14.el9_7.i686.rpm SHA-256: 023192e9c4a3ec2a65da30727841ee639fc79f89c9f67ddcdc653bf5a409406f
munge-devel-0.5.13-14.el9_7.x86_64.rpm SHA-256: 2314574343d56ef056b15a05db92a096575e04a5844c812cd392e2689df7b597
munge-libs-debuginfo-0.5.13-14.el9_7.i686.rpm SHA-256: 0c1429cd5b3ced1a185087f3b3182bce23749a58fe8345c227977f0275cf528b
munge-libs-debuginfo-0.5.13-14.el9_7.x86_64.rpm SHA-256: 8b7bdce93a74a4d371cd142056cb2637e2943b80c1edbfb884359f4a4ce14cf9

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM
ppc64le
munge-debuginfo-0.5.13-14.el9_7.ppc64le.rpm SHA-256: cd1fc043bb751ef772a43f04cc5e145f40257c340a53040158d9cf5f3bb03618
munge-debugsource-0.5.13-14.el9_7.ppc64le.rpm SHA-256: 66ece07fa0f2a6915cbdf24c601a4aced96b5b253153d530769551bb695385a6
munge-devel-0.5.13-14.el9_7.ppc64le.rpm SHA-256: 91ac2f03a8d0bb0ec287bed358dcdac4a40d85c940bfff385a53b22ca6fa734a
munge-libs-debuginfo-0.5.13-14.el9_7.ppc64le.rpm SHA-256: f9fcaee8fef6da01031790bd1748a1a82a42474b66116b174b46dca2ecafa38b

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM
aarch64
munge-debuginfo-0.5.13-14.el9_7.aarch64.rpm SHA-256: dba5850ff17eaf689c7c7c89c999d68d2169ffbc695711c3c67bbb93d753c839
munge-debugsource-0.5.13-14.el9_7.aarch64.rpm SHA-256: f21d01b8d339502b7227daef05699a729b979da30d0a6900dc807c3327e5ba70
munge-devel-0.5.13-14.el9_7.aarch64.rpm SHA-256: 7644d6c6da09ee7d0d614a5a0fb8db78a9a887d540a795ddd98e933af9e3244d
munge-libs-debuginfo-0.5.13-14.el9_7.aarch64.rpm SHA-256: 6c6bc59646dbe36d75f5ea06ead33d9ae5ef05ca8cd4e62c66b33147fb4d69b0

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM
s390x
munge-debuginfo-0.5.13-14.el9_7.s390x.rpm SHA-256: 5d943fdab459ec8c1aedf1c395b45170108c0772af9c5fe8442f8dc8e6eebd55
munge-debugsource-0.5.13-14.el9_7.s390x.rpm SHA-256: 52fa75e88ca180378e0deabef371efaa215bcf616c8ca41e4cdc91d6593b132c
munge-devel-0.5.13-14.el9_7.s390x.rpm SHA-256: 99d0be1a94abe4b8e19871746b2f5250f0d1c9ec6c0cf5ad85301bb2d95e900d
munge-libs-debuginfo-0.5.13-14.el9_7.s390x.rpm SHA-256: 60fee2d422ca9df00526962eb55a402bf115fd0d215deff69055327c3347c012

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility