Critical Privilege Escalation Vulnerabilities in SUSE Linux Micro 6.0
Severity: High (Score: 68.2)
Sources: Linuxsecurity
Summary
SUSE Linux Micro 6.0 has been updated to address two critical vulnerabilities in systemd. CVE-2026-4105 allows privilege escalation due to improper access control in the RegisterMachine D-Bus method, while CVE-2026-29111 enables local unprivileged users to trigger an assert in systemd. Both vulnerabilities were published recently, with CVE-2026-4105 on March 13, 2026, and CVE-2026-29111 on March 23, 2026. The affected systems include SUSE Linux Micro 6.0 and SUSE Linux Micro Extras 6.0. The updates also include non-security fixes related to udev and libsystemd naming conventions. Security professionals are urged to apply the patches promptly to mitigate these risks. The CVSS scores for CVE-2026-4105 range from 6.7 to 7.8, indicating a high severity level. Current status shows that the vulnerabilities can be patched immediately. Key Points: • SUSE Linux Micro 6.0 is affected by two critical vulnerabilities in systemd. • CVE-2026-4105 and CVE-2026-29111 pose significant risks of privilege escalation. • Immediate patching is recommended to mitigate these vulnerabilities.
Key Entities
- CVE-2026-29111 (cve)
- CVE-2026-4105 (cve)
- T1068 - Exploitation for Privilege Escalation (mitre_attack)
- SUSE Linux Micro 6.0 (platform)
- Systemd (platform)
- Udev (platform)