CVE-2026-41054

NameCVE-2026-41054
DescriptionIn `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6292-1
Debian Bugs1137096

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
haveged (PTS)bookworm, bullseye1.9.14-1vulnerable
bookworm (security)1.9.14-1+deb12u1fixed
trixie1.9.19-12vulnerable
trixie (security)1.9.19-12+deb13u1fixed
forky, sid1.9.21-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
havegedsourcebookworm1.9.14-1+deb12u1DSA-6292-1
havegedsourcetrixie1.9.19-12+deb13u1DSA-6292-1
havegedsource(unstable)1.9.21-11137096

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1264086
Introduced with: https://github.com/jirka-h/haveged/commit/a2496c5de9af7e3ac3ef82a2257d14d8a0ac37fb (1.9.3)
Fixed by: https://github.com/jirka-h/haveged/commit/3870de0270d3fa2067490ffa47491abde4ad69c6 (v1.9.21)
Hardening: https://github.com/jirka-h/haveged/commit/bcd7e52bcf0068225b7ee84a1f85c9d72a787b54 (v1.9.21)

Search for package or bug name: Reporting problems