|
|
Message-ID: <20260519135323.EMFPwImj@steffen%sdaoden.eu> Date: Tue, 19 May 2026 15:53:23 +0200 From: Steffen Nurpmeso <steffen@...oden.eu> To: oss-security@...ts.openwall.com Subject: Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Hanno Böck wrote in <20260519151600.3ded0958@...eck.de>: |On Tue, 19 May 2026 12:27:03 +0000 |Marcus Meissner <meissner@...e.de> wrote: | |> If you are using haveged, todays release fixes a local root exploit. | |You can also fix this by uninstalling it. | |There's no need to have an "entropy daemon"... It adds needless |complexity and, as this issue shows, attack surface. There have been |many improvements in the Linux kernel's RNG (Jason Donenfeld, also known |as the Wireguard developer, did a lot of work on that) and I am quite |confident that there are no problems with the RNG on any reasonably |recent Linux kernel that an "entropy daemon" would help with. Despite that "initial seeding hang" that once came with OpenSSH, to me the most problematic thing was Python2 Mailman2, which consumes an unbelievable "amount of entropy" with each loop tick, for whatever unknown reason, i have never looked. This counteracted the super conservative "entropy counting" of the Linux kernel, causing stalls to absolute no-go. The only option one had was to carefully save+restore entropy across boots, as well as installing some jitterentropy daemon who then "blew thousands of bits of entropy" into the kernel within smallest fractions of a second. I do not think that the Linux RNG was that much different than for example the OpenBSD one, or the GnuPG one, they all used somewhat sliding windows on large pools, stirring in, "blinding" results, do they. Anyway, now Linux comes with Blake2 and "perfect forward secrecy", or, as Donenfeld said, "32 byte is enough". (He, of course, last i looked, went over great lengths to feed in samples from all over the place, etc etc -- very long story.) Or, in short: anyone who still drives Mailman2 (i do) on some elder kernel which still uses T'so's RNG, with its conservative "entropy counting", actually does need some entropy feed. --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.