In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.

Project Subscriptions

Vendors Products
Suse Linux Enterprise For Sap Applications Subscribe
Container Suse/sle-micro Subscribe
Container Suse/sle-micro-rancher Subscribe
Image Sles15-sp4-sap-byos Subscribe
Image Sles15-sp4-sap-byos-azure Subscribe
Image Sles15-sp4-sap-byos-ec2 Subscribe
Image Sles15-sp4-sap-byos-gce Subscribe
Image Sles15-sp4-sap-hardened Subscribe
Image Sles15-sp4-sap-hardened-byos Subscribe
Image Sles15-sp4-sap-hardened-byos-azure Subscribe
Image Sles15-sp4-sap-hardened-byos-ec2 Subscribe
Image Sles15-sp4-sap-hardened-byos-gce Subscribe
Image Sles15-sp4-sap-hardened-gce Subscribe
Linux Enterprise High Performance Computing Subscribe
Linux Enterprise Micro Subscribe
Manager Proxy Subscribe
Manager Retail Branch Server Subscribe
Manager Server Subscribe
Suse Linux Enterprise Desktop Subscribe
Suse Linux Enterprise Module For Basesystem Subscribe
Suse Linux Enterprise Server Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 May 2026 23:30:00 +0000

Type Values Removed Values Added
References

Thu, 21 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Novell
Novell suse Linux Enterprise For Sap Applications
Suse
Suse container Suse/sle-micro
Suse container Suse/sle-micro-rancher
Suse image Sles15-sp4-sap-byos
Suse image Sles15-sp4-sap-byos-azure
Suse image Sles15-sp4-sap-byos-ec2
Suse image Sles15-sp4-sap-byos-gce
Suse image Sles15-sp4-sap-hardened
Suse image Sles15-sp4-sap-hardened-byos
Suse image Sles15-sp4-sap-hardened-byos-azure
Suse image Sles15-sp4-sap-hardened-byos-ec2
Suse image Sles15-sp4-sap-hardened-byos-gce
Suse image Sles15-sp4-sap-hardened-gce
Suse linux Enterprise High Performance Computing
Suse linux Enterprise Micro
Suse manager Proxy
Suse manager Retail Branch Server
Suse manager Server
Suse suse Linux Enterprise Desktop
Suse suse Linux Enterprise Module For Basesystem
Suse suse Linux Enterprise Server
Vendors & Products Novell
Novell suse Linux Enterprise For Sap Applications
Suse
Suse container Suse/sle-micro
Suse container Suse/sle-micro-rancher
Suse image Sles15-sp4-sap-byos
Suse image Sles15-sp4-sap-byos-azure
Suse image Sles15-sp4-sap-byos-ec2
Suse image Sles15-sp4-sap-byos-gce
Suse image Sles15-sp4-sap-hardened
Suse image Sles15-sp4-sap-hardened-byos
Suse image Sles15-sp4-sap-hardened-byos-azure
Suse image Sles15-sp4-sap-hardened-byos-ec2
Suse image Sles15-sp4-sap-hardened-byos-gce
Suse image Sles15-sp4-sap-hardened-gce
Suse linux Enterprise High Performance Computing
Suse linux Enterprise Micro
Suse manager Proxy
Suse manager Retail Branch Server
Suse manager Server
Suse suse Linux Enterprise Desktop
Suse suse Linux Enterprise Module For Basesystem
Suse suse Linux Enterprise Server

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 10:30:00 +0000


Wed, 20 May 2026 10:00:00 +0000

Type Values Removed Values Added
Description In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Title Missing exit out of permission check in haveged could lead to root exploit
Weaknesses CWE-305
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2026-05-21T22:29:29.312Z

Reserved: 2026-04-16T13:37:50.680Z

Link: CVE-2026-41054

cve-icon Vulnrichment

Updated: 2026-05-21T22:29:29.312Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T10:16:26.990

Modified: 2026-05-21T23:16:45.567

Link: CVE-2026-41054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T08:19:27Z

Weaknesses