|
|
Message-ID: <20260519151600.3ded0958@hboeck.de> Date: Tue, 19 May 2026 15:16:00 +0200 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 On Tue, 19 May 2026 12:27:03 +0000 Marcus Meissner <meissner@...e.de> wrote: > If you are using haveged, todays release fixes a local root exploit. You can also fix this by uninstalling it. There's no need to have an "entropy daemon"... It adds needless complexity and, as this issue shows, attack surface. There have been many improvements in the Linux kernel's RNG (Jason Donenfeld, also known as the Wireguard developer, did a lot of work on that) and I am quite confident that there are no problems with the RNG on any reasonably recent Linux kernel that an "entropy daemon" would help with. -- Hanno Böck - Independent security researcher https://itsec.hboeck.de/ https://badkeys.info/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.