In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Metrics
Affected Vendors & Products
References
History
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 20 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`. | |
| Title | Missing exit out of permission check in haveged could lead to root exploit | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-05-20T12:18:15.866Z
Reserved: 2026-04-16T13:37:50.680Z
Link: CVE-2026-41054
Updated: 2026-05-20T09:09:33.506Z
Status : Awaiting Analysis
Published: 2026-05-20T10:16:26.990
Modified: 2026-05-20T14:25:57.283
Link: CVE-2026-41054
No data.
OpenCVE Enrichment
No data.