SUSE-SU-2026:20826-1
Vulnerability from csaf_suse - Published: 2026-03-24 09:34 - Updated: 2026-03-24 09:34Summary
Security update for systemd
Severity
Important
Notes
Title of the patch: Security update for systemd
Description of the patch: This update for systemd fixes the following issues:
- CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650).
- CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418).
- udev: check for invalid chars in various fields received from the kernel (bsc#1259697).
Changelog:
- a943e3ce2f machined: reject invalid class types when registering machines
- 71593f77db udev: fix review mixup
- 73a89810b4 udev-builtin-net-id: print cescaped bad attributes
- 0f360bfdc0 udev-builtin-net_id: do not assume the current interface name is ethX
- 40905232e2 udev: ensure tag parsing stays within bounds
- 7bce9026e3 udev: ensure there is space for trailing NUL before calling sprintf
- d018ac1ea3 udev: check for invalid chars in various fields received from the kernel
- aef6e11921 core/cgroup: avoid one unnecessary strjoina()
- cc7426f38a sd-json: fix off-by-one issue when updating parent for array elements
- 26a748f727 core: validate input cgroup path more prudently
- 99d8308fde core/dbus-manager: propagate meaningful dbus errors from EnqueueMarkedJobs
Patchnames: SUSE-SLE-Micro-6.1-458
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd fixes the following issues:\n\n- CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650).\n- CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418).\n- udev: check for invalid chars in various fields received from the kernel (bsc#1259697). \n\nChangelog:\n\n- a943e3ce2f machined: reject invalid class types when registering machines \n- 71593f77db udev: fix review mixup\n- 73a89810b4 udev-builtin-net-id: print cescaped bad attributes\n- 0f360bfdc0 udev-builtin-net_id: do not assume the current interface name is ethX\n- 40905232e2 udev: ensure tag parsing stays within bounds\n- 7bce9026e3 udev: ensure there is space for trailing NUL before calling sprintf\n- d018ac1ea3 udev: check for invalid chars in various fields received from the kernel\n- aef6e11921 core/cgroup: avoid one unnecessary strjoina()\n- cc7426f38a sd-json: fix off-by-one issue when updating parent for array elements\n- 26a748f727 core: validate input cgroup path more prudently \n- 99d8308fde core/dbus-manager: propagate meaningful dbus errors from EnqueueMarkedJobs\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-458",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20826-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20826-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620826-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20826-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1259418",
"url": "https://bugzilla.suse.com/1259418"
},
{
"category": "self",
"summary": "SUSE Bug 1259650",
"url": "https://bugzilla.suse.com/1259650"
},
{
"category": "self",
"summary": "SUSE Bug 1259697",
"url": "https://bugzilla.suse.com/1259697"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4105/"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2026-03-24T09:34:46Z",
"generator": {
"date": "2026-03-24T09:34:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20826-1",
"initial_release_date": "2026-03-24T09:34:46Z",
"revision_history": [
{
"date": "2026-03-24T09:34:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"product_id": "libsystemd0-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "libudev1-254.27-slfo.1.1_4.1.aarch64",
"product_id": "libudev1-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-container-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-container-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-container-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-coredump-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-experimental-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"product_id": "systemd-portable-254.27-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "udev-254.27-slfo.1.1_4.1.aarch64",
"product": {
"name": "udev-254.27-slfo.1.1_4.1.aarch64",
"product_id": "udev-254.27-slfo.1.1_4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "libsystemd0-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libudev1-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "libudev1-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-container-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-coredump-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-experimental-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-portable-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-254.27-slfo.1.1_4.1.ppc64le",
"product": {
"name": "udev-254.27-slfo.1.1_4.1.ppc64le",
"product_id": "udev-254.27-slfo.1.1_4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.s390x",
"product_id": "libsystemd0-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "libudev1-254.27-slfo.1.1_4.1.s390x",
"product_id": "libudev1-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-container-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-container-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-container-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-coredump-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-experimental-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-journal-remote-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-portable-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.s390x",
"product_id": "systemd-portable-254.27-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "udev-254.27-slfo.1.1_4.1.s390x",
"product": {
"name": "udev-254.27-slfo.1.1_4.1.s390x",
"product_id": "udev-254.27-slfo.1.1_4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"product_id": "libsystemd0-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "libudev1-254.27-slfo.1.1_4.1.x86_64",
"product_id": "libudev1-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-container-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-container-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-container-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-coredump-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-experimental-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"product_id": "systemd-portable-254.27-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "udev-254.27-slfo.1.1_4.1.x86_64",
"product": {
"name": "udev-254.27-slfo.1.1_4.1.x86_64",
"product_id": "udev-254.27-slfo.1.1_4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "libsystemd0-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "libudev1-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libudev1-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "libudev1-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "libudev1-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-container-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-container-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-container-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "systemd-portable-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-254.27-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64"
},
"product_reference": "udev-254.27-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-254.27-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le"
},
"product_reference": "udev-254.27-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-254.27-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x"
},
"product_reference": "udev-254.27-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-254.27-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
},
"product_reference": "udev-254.27-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-29111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29111"
}
],
"notes": [
{
"category": "general",
"text": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29111",
"url": "https://www.suse.com/security/cve/CVE-2026-29111"
},
{
"category": "external",
"summary": "SUSE Bug 1259418 for CVE-2026-29111",
"url": "https://bugzilla.suse.com/1259418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T09:34:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-29111"
},
{
"cve": "CVE-2026-4105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4105"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4105",
"url": "https://www.suse.com/security/cve/CVE-2026-4105"
},
{
"category": "external",
"summary": "SUSE Bug 1259650 for CVE-2026-4105",
"url": "https://bugzilla.suse.com/1259650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libsystemd0-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libudev1-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-container-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-coredump-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-experimental-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-journal-remote-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:systemd-portable-254.27-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:systemd-sysvcompat-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:udev-254.27-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T09:34:46Z",
"details": "important"
}
],
"title": "CVE-2026-4105"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…