FYI, (which others probably already know). Munge needs to be updated on the slurmctld node(s) before being updated on the slurmd nodes in my limited testing. Similar to how slurm is updated. Updating munge on a slurmd node before the slurmctld caused errors on the slurmd node for the one instance I did that.
--- Sean McGrath Systems Administrator Research IT IT Services Trinity College Dublin 00 353 - (0)1 896 3725 https://www.tcd.ie/itservices/ https://www.tchpc.tcd.ie/<http://www.tchpc.tcd.ie/> ________________________________ From: Ole Holm Nielsen via slurm-users <[email protected]> Sent: Tuesday 10 February 2026 20:59 To: [email protected] <[email protected]> Subject: [slurm-users] Re: MUNGE security issue (CVE-2026-25506) [External Email] This email originated outside of Trinity College Dublin. Do not click links or open attachments unless you recognise the sender and know the content is safe. On 2/10/2026 7:04 PM, Tim Wickberg via slurm-users wrote: > MUNGE just announced a serious security issue as CVE-2026-25506: Just a small note on Munge [1] for those of you with RPM-based systems: Build Munge 0.5.18 RPM packages by: wget https://github.com/dun/munge/releases/download/munge-0.5.18/munge-0.5.18.tar.xz rpmbuild -ta munge-0.5.18.tar.xz and install the packages from the directory ~/rpmbuild/RPMS/x86_64/ (or whatever your architecture is). Best regards, Ole [1] https://github.com/dun/munge/releases -- Ole Holm Nielsen PhD, Senior HPC Officer Department of Physics, Technical University of Denmark -- slurm-users mailing list -- [email protected] To unsubscribe send an email to [email protected]
-- slurm-users mailing list -- [email protected] To unsubscribe send an email to [email protected]
