In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 10:30:00 +0000


Wed, 20 May 2026 10:00:00 +0000

Type Values Removed Values Added
Description In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Title Missing exit out of permission check in haveged could lead to root exploit
Weaknesses CWE-305
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2026-05-20T12:18:15.866Z

Reserved: 2026-04-16T13:37:50.680Z

Link: CVE-2026-41054

cve-icon Vulnrichment

Updated: 2026-05-20T09:09:33.506Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T10:16:26.990

Modified: 2026-05-20T14:25:57.283

Link: CVE-2026-41054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses