SUSE alert SUSE-SU-2026:20827-1 (systemd)
| From: | SLE-SECURITY-UPDATES <null@suse.de> | |
| To: | sle-security-updates@lists.suse.com | |
| Subject: | SUSE-SU-2026:20827-1: important: Security update for systemd | |
| Date: | Thu, 26 Mar 2026 16:30:09 -0000 | |
| Message-ID: | <177454260911.1043.10756735308734947454@c498d0a85550> |
# Security update for systemd Announcement ID: SUSE-SU-2026:20827-1 Release Date: 2026-03-24T09:38:06Z Rating: important References: * bsc#1259418 * bsc#1259650 * bsc#1259697 Cross-References: * CVE-2026-29111 * CVE-2026-4105 CVSS scores: * CVE-2026-29111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-29111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-29111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-4105 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-4105 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-4105 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for systemd fixes the following issues: * CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650). * CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418). * udev: check for invalid chars in various fields received from the kernel (bsc#1259697). Changelog: * a943e3ce2f machined: reject invalid class types when registering machines * 71593f77db udev: fix review mixup * 73a89810b4 udev-builtin-net-id: print cescaped bad attributes * 0f360bfdc0 udev-builtin-net_id: do not assume the current interface name is ethX * 40905232e2 udev: ensure tag parsing stays within bounds * 7bce9026e3 udev: ensure there is space for trailing NUL before calling sprintf * d018ac1ea3 udev: check for invalid chars in various fields received from the kernel * aef6e11921 core/cgroup: avoid one unnecessary strjoina() * cc7426f38a sd-json: fix off-by-one issue when updating parent for array elements * 26a748f727 core: validate input cgroup path more prudently * 99d8308fde core/dbus-manager: propagate meaningful dbus errors from EnqueueMarkedJobs ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-Extras-6.1-458=1 ## Package List: * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-debugsource-254.27-slfo.1.1_4.1 * systemd-devel-254.27-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2026-29111.html * https://www.suse.com/security/cve/CVE-2026-4105.html * https://bugzilla.suse.com/show_bug.cgi?id=1259418 * https://bugzilla.suse.com/show_bug.cgi?id=1259650 * https://bugzilla.suse.com/show_bug.cgi?id=1259697
Attachment: None (type=text/html)
(HTML attachment elided)
