Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALT_uBTUqWwg4uUgPj4Ax3TV1Hhk4qfwvb8RHvti84C6nyCkyQ@mail.gmail.com>
Date: Wed, 20 May 2026 01:45:48 +0200
From: Jiri Hladky <hladky.jiri@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-41054: haveged — privilege escalation via command socket

Hello,

A privilege escalation vulnerability was found in haveged, the Linux
entropy daemon.

CVE: CVE-2026-41054
Affected versions: All versions with command socket support (1.9.14+)
Fixed in: 1.9.21

Description:

The socket_handler() function in src/havegecmd.c checks the connecting
peer's uid via SO_PEERCRED and sends a NAK response to non-root
callers. However, after sending the NAK, execution continued into the
command switch instead of returning. This allowed unprivileged local
users to send commands (MAGIC_CHROOT, MAGIC_CLOSE) to the root-running
daemon via the abstract UNIX socket.

Impact:

A local unprivileged user could force the daemon to chroot to an
attacker-controlled directory or close the daemon's command socket.

Fix:

- Add goto out after the NAK response to properly reject non-root connections
- Move the credential check before command parsing as defense in depth

Links:

- Release: https://github.com/jirka-h/haveged/releases/tag/v1.9.21
- Fix commit: https://github.com/jirka-h/haveged/commit/3870de0
- Hardening commit: https://github.com/jirka-h/haveged/commit/bcd7e52
- Bug report: https://bugzilla.suse.com/show_bug.cgi?id=1264086

Credit:
Reported by Dirk Müller (SUSE).

Thank you,
Jirka Hladky

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.