Project Subscriptions
| Vendors | Products |
|---|---|
|
Novell
Subscribe
|
Suse Linux Enterprise For Sap Applications
Subscribe
|
|
Suse
Subscribe
|
Container Suse/sle-micro
Subscribe
Container Suse/sle-micro-rancher
Subscribe
Image Sles15-sp4-sap-byos
Subscribe
Image Sles15-sp4-sap-byos-azure
Subscribe
Image Sles15-sp4-sap-byos-ec2
Subscribe
Image Sles15-sp4-sap-byos-gce
Subscribe
Image Sles15-sp4-sap-hardened
Subscribe
Image Sles15-sp4-sap-hardened-byos
Subscribe
Image Sles15-sp4-sap-hardened-byos-azure
Subscribe
Image Sles15-sp4-sap-hardened-byos-ec2
Subscribe
Image Sles15-sp4-sap-hardened-byos-gce
Subscribe
Image Sles15-sp4-sap-hardened-gce
Subscribe
Linux Enterprise High Performance Computing
Subscribe
Linux Enterprise Micro
Subscribe
Manager Proxy
Subscribe
Manager Retail Branch Server
Subscribe
Manager Server
Subscribe
Suse Linux Enterprise Desktop
Subscribe
Suse Linux Enterprise Module For Basesystem
Subscribe
Suse Linux Enterprise Server
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Novell
Novell suse Linux Enterprise For Sap Applications Suse Suse container Suse/sle-micro Suse container Suse/sle-micro-rancher Suse image Sles15-sp4-sap-byos Suse image Sles15-sp4-sap-byos-azure Suse image Sles15-sp4-sap-byos-ec2 Suse image Sles15-sp4-sap-byos-gce Suse image Sles15-sp4-sap-hardened Suse image Sles15-sp4-sap-hardened-byos Suse image Sles15-sp4-sap-hardened-byos-azure Suse image Sles15-sp4-sap-hardened-byos-ec2 Suse image Sles15-sp4-sap-hardened-byos-gce Suse image Sles15-sp4-sap-hardened-gce Suse linux Enterprise High Performance Computing Suse linux Enterprise Micro Suse manager Proxy Suse manager Retail Branch Server Suse manager Server Suse suse Linux Enterprise Desktop Suse suse Linux Enterprise Module For Basesystem Suse suse Linux Enterprise Server |
|
| Vendors & Products |
Novell
Novell suse Linux Enterprise For Sap Applications Suse Suse container Suse/sle-micro Suse container Suse/sle-micro-rancher Suse image Sles15-sp4-sap-byos Suse image Sles15-sp4-sap-byos-azure Suse image Sles15-sp4-sap-byos-ec2 Suse image Sles15-sp4-sap-byos-gce Suse image Sles15-sp4-sap-hardened Suse image Sles15-sp4-sap-hardened-byos Suse image Sles15-sp4-sap-hardened-byos-azure Suse image Sles15-sp4-sap-hardened-byos-ec2 Suse image Sles15-sp4-sap-hardened-byos-gce Suse image Sles15-sp4-sap-hardened-gce Suse linux Enterprise High Performance Computing Suse linux Enterprise Micro Suse manager Proxy Suse manager Retail Branch Server Suse manager Server Suse suse Linux Enterprise Desktop Suse suse Linux Enterprise Module For Basesystem Suse suse Linux Enterprise Server |
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 20 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`. | |
| Title | Missing exit out of permission check in haveged could lead to root exploit | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-05-21T22:29:29.312Z
Reserved: 2026-04-16T13:37:50.680Z
Link: CVE-2026-41054
Updated: 2026-05-21T22:29:29.312Z
Status : Awaiting Analysis
Published: 2026-05-20T10:16:26.990
Modified: 2026-05-21T23:16:45.567
Link: CVE-2026-41054
No data.
OpenCVE Enrichment
Updated: 2026-05-21T08:19:27Z