oss-sec mailing list archives
Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054
From: Steffen Nurpmeso <steffen () sdaoden eu>
Date: Tue, 19 May 2026 15:53:23 +0200
Hanno Böck wrote in <20260519151600.3ded0958 () hboeck de>: |On Tue, 19 May 2026 12:27:03 +0000 |Marcus Meissner <meissner () suse de> wrote: | |> If you are using haveged, todays release fixes a local root exploit. | |You can also fix this by uninstalling it. | |There's no need to have an "entropy daemon"... It adds needless |complexity and, as this issue shows, attack surface. There have been |many improvements in the Linux kernel's RNG (Jason Donenfeld, also known |as the Wireguard developer, did a lot of work on that) and I am quite |confident that there are no problems with the RNG on any reasonably |recent Linux kernel that an "entropy daemon" would help with. Despite that "initial seeding hang" that once came with OpenSSH, to me the most problematic thing was Python2 Mailman2, which consumes an unbelievable "amount of entropy" with each loop tick, for whatever unknown reason, i have never looked. This counteracted the super conservative "entropy counting" of the Linux kernel, causing stalls to absolute no-go. The only option one had was to carefully save+restore entropy across boots, as well as installing some jitterentropy daemon who then "blew thousands of bits of entropy" into the kernel within smallest fractions of a second. I do not think that the Linux RNG was that much different than for example the OpenBSD one, or the GnuPG one, they all used somewhat sliding windows on large pools, stirring in, "blinding" results, do they. Anyway, now Linux comes with Blake2 and "perfect forward secrecy", or, as Donenfeld said, "32 byte is enough". (He, of course, last i looked, went over great lengths to feed in samples from all over the place, etc etc -- very long story.) Or, in short: anyone who still drives Mailman2 (i do) on some elder kernel which still uses T'so's RNG, with its conservative "entropy counting", actually does need some entropy feed. --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt)
Current thread:
- Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Marcus Meissner (May 19)
- Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Hanno Böck (May 19)
- Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Steffen Nurpmeso (May 19)
- CVE-2026-41054: haveged — privilege escalation via command socket Jiri Hladky (May 19)
- Re: Fixed: local root exploit in haveged, fixed in 1.9.21, CVE-2026-41054 Hanno Böck (May 19)
