| Name | CVE-2026-41054 |
| Description | In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-6292-1 |
| Debian Bugs | 1137096 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| haveged (PTS) | bookworm, bullseye | 1.9.14-1 | vulnerable |
| bookworm (security) | 1.9.14-1+deb12u1 | fixed | |
| trixie | 1.9.19-12 | vulnerable | |
| trixie (security) | 1.9.19-12+deb13u1 | fixed | |
| forky, sid | 1.9.21-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| haveged | source | bookworm | 1.9.14-1+deb12u1 | DSA-6292-1 | ||
| haveged | source | trixie | 1.9.19-12+deb13u1 | DSA-6292-1 | ||
| haveged | source | (unstable) | 1.9.21-1 | 1137096 |
https://bugzilla.suse.com/show_bug.cgi?id=1264086
Introduced with: https://github.com/jirka-h/haveged/commit/a2496c5de9af7e3ac3ef82a2257d14d8a0ac37fb (1.9.3)
Fixed by: https://github.com/jirka-h/haveged/commit/3870de0270d3fa2067490ffa47491abde4ad69c6 (v1.9.21)
Hardening: https://github.com/jirka-h/haveged/commit/bcd7e52bcf0068225b7ee84a1f85c9d72a787b54 (v1.9.21)