A privilege escalation vulnerability was found in haveged. The socket_handler() function in src/havegecmd.c checks the connecting peer's uid via SO_PEERCRED and sends a NAK response to non-root callers. However, after sending the NAK, execution continued into the command switch instead of returning. This allowed unprivileged local users to send commands (MAGIC_CHROOT, MAGIC_CLOSE) to the root-running daemon via the abstract UNIX socket. Affected: all versions with command socket support (1.9.14+) Upstream fix: https://github.com/jirka-h/haveged/releases/tag/v1.9.21 Fix commit: https://github.com/jirka-h/haveged/commit/3870de0 SUSE bug: https://bugzilla.suse.com/show_bug.cgi?id=1264086 Fixed in: haveged-1.9.21-1 (rawhide, f44, f43, f42, epel9, epel10) Fixed in: haveged-1.9.14-2 (epel8, backported patch)
FEDORA-EPEL-2026-56fb074420 (haveged-1.9.14-2.el8) has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-56fb074420
FEDORA-EPEL-2026-efe6be3dfa (haveged-1.9.21-1.el9) has been submitted as an update to Fedora EPEL 9. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-efe6be3dfa
FEDORA-EPEL-2026-b3a94630f0 (haveged-1.9.21-1.el10_3) has been submitted as an update to Fedora EPEL 10.3. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-b3a94630f0
FEDORA-EPEL-2026-ca77194ac0 (haveged-1.9.21-1.el10_2) has been submitted as an update to Fedora EPEL 10.2. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-ca77194ac0
FEDORA-2026-7fcffd5c31 (haveged-1.9.21-1.fc42) has been submitted as an update to Fedora 42. https://bodhi.fedoraproject.org/updates/FEDORA-2026-7fcffd5c31
FEDORA-2026-12643837bd (haveged-1.9.21-1.fc44) has been submitted as an update to Fedora 44. https://bodhi.fedoraproject.org/updates/FEDORA-2026-12643837bd
FEDORA-2026-43e2722e8f (haveged-1.9.21-1.fc43) has been submitted as an update to Fedora 43. https://bodhi.fedoraproject.org/updates/FEDORA-2026-43e2722e8f