|
|
Message-ID: <CALT_uBTUqWwg4uUgPj4Ax3TV1Hhk4qfwvb8RHvti84C6nyCkyQ@mail.gmail.com> Date: Wed, 20 May 2026 01:45:48 +0200 From: Jiri Hladky <hladky.jiri@...il.com> To: oss-security@...ts.openwall.com Subject: CVE-2026-41054: haveged — privilege escalation via command socket Hello, A privilege escalation vulnerability was found in haveged, the Linux entropy daemon. CVE: CVE-2026-41054 Affected versions: All versions with command socket support (1.9.14+) Fixed in: 1.9.21 Description: The socket_handler() function in src/havegecmd.c checks the connecting peer's uid via SO_PEERCRED and sends a NAK response to non-root callers. However, after sending the NAK, execution continued into the command switch instead of returning. This allowed unprivileged local users to send commands (MAGIC_CHROOT, MAGIC_CLOSE) to the root-running daemon via the abstract UNIX socket. Impact: A local unprivileged user could force the daemon to chroot to an attacker-controlled directory or close the daemon's command socket. Fix: - Add goto out after the NAK response to properly reject non-root connections - Move the credential check before command parsing as defense in depth Links: - Release: https://github.com/jirka-h/haveged/releases/tag/v1.9.21 - Fix commit: https://github.com/jirka-h/haveged/commit/3870de0 - Hardening commit: https://github.com/jirka-h/haveged/commit/bcd7e52 - Bug report: https://bugzilla.suse.com/show_bug.cgi?id=1264086 Credit: Reported by Dirk Müller (SUSE). Thank you, Jirka Hladky
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.