{"affected":[{"ecosystem_specific":{"binaries":[{"libmunge2":"0.5.14-3.11.1","munge":"0.5.14-3.11.1","munge-devel":"0.5.14-3.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for HPC 12","name":"munge","purl":"pkg:rpm/suse/munge&distro=SUSE%20Linux%20Enterprise%20Module%20for%20HPC%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.14-3.11.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for munge fixes the following issues:\n\n- CVE-2026-25506: buffer overflow in message unpacking (bsc#1257651).\n- Make `logrotate` work on log as user `munge` to prevent local privilege escalation (bsc#1246088).\n","id":"SUSE-SU-2026:0448-1","modified":"2026-02-11T14:51:56Z","published":"2026-02-11T14:51:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260448-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-25506"}],"related":["CVE-2026-25506"],"summary":"Security update for munge","upstream":["CVE-2026-25506"]}