Back

Critical Privilege Escalation Vulnerabilities in SUSE Linux Micro 6.0

Severity: High (Score: 68.2)

Sources: Linuxsecurity

Summary

SUSE Linux Micro 6.0 has been updated to address two critical vulnerabilities in systemd. CVE-2026-4105 allows privilege escalation due to improper access control in the RegisterMachine D-Bus method, while CVE-2026-29111 enables local unprivileged users to trigger an assert in systemd. Both vulnerabilities were published recently, with CVE-2026-4105 on March 13, 2026, and CVE-2026-29111 on March 23, 2026. The affected systems include SUSE Linux Micro 6.0 and SUSE Linux Micro Extras 6.0. The updates also include non-security fixes related to udev and libsystemd naming conventions. Security professionals are urged to apply the patches promptly to mitigate these risks. The CVSS scores for CVE-2026-4105 range from 6.7 to 7.8, indicating a high severity level. Current status shows that the vulnerabilities can be patched immediately. Key Points: • SUSE Linux Micro 6.0 is affected by two critical vulnerabilities in systemd. • CVE-2026-4105 and CVE-2026-29111 pose significant risks of privilege escalation. • Immediate patching is recommended to mitigate these vulnerabilities.

Key Entities

  • CVE-2026-29111 (cve)
  • CVE-2026-4105 (cve)
  • T1068 - Exploitation for Privilege Escalation (mitre_attack)
  • SUSE Linux Micro 6.0 (platform)
  • Systemd (platform)
  • Udev (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed