|
|
Message-ID: <agxXF1J53iSJIrP6@suse.de> Date: Tue, 19 May 2026 12:27:03 +0000 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Subject: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Hi, If you are using haveged, todays release fixes a local root exploit. https://github.com/jirka-h/haveged/releases Release 1.9.21 — Security fix for CVE-2026-41054 Fix privilege escalation via command socket (CVE-2026-41054) - the uid check sent a NAK to non-root callers but did not exit the function, allowing unprivileged local users to send commands to the root-running daemon via the abstract UNIX socket. Problem was found by Gemini Pro, operated by Dirk Mueller of SUSE. https://bugzilla.suse.com/show_bug.cgi?id=1264086 The bug was added in 1.9.3. Ciao, Marcus -- Marcus Meissner (he/him), Distinguished Engineer / Senior Project Manager Security SUSE Software Solutions Germany GmbH, Frankenstrasse 146, 90461 Nuernberg, Germany GF: Jochen Jaser, Andrew McDonald, Werner Knoblich, HRB 36809, AG Nuernberg
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.