Local Privilege Escalation via haveged UNIX Socket on SUSE
CVE-2026-41054 Published on May 20, 2026
Missing exit out of permission check in haveged could lead to root exploit
In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Vulnerability Analysis
CVE-2026-41054 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Products Associated with CVE-2026-41054
Want to know whenever a new CVE is published for Suse products? stack.watch will email you.
Affected Versions
Container suse/sle-micro-rancher/5.3:latest:- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150600.11.6.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.
- Version ? and below 1.9.14-150400.3.11.1 is affected.