Package "systemd"

Name: systemd


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • nss module to resolve hostnames for local container instances
  • nss module to resolve names via systemd-resolved
  • systemd container/nspawn tools
  • tools for storing and retrieving coredumps

Latest version: 237-3ubuntu10.50
Release: bionic (18.04)
Level: updates
Repository: universe


Other versions of "systemd" in Bionic

Repository Area Version
base main 237-3ubuntu10
base universe 237-3ubuntu10
security main 237-3ubuntu10.50
security universe 237-3ubuntu10.50
updates main 237-3ubuntu10.50

Packages in group

Deleted packages are displayed in grey.


Version: 237-3ubuntu10.50 2021-07-22 02:06:24 UTC

  systemd (237-3ubuntu10.50) bionic-security; urgency=medium

  * d/p/lp1937117-revert-lp1929560-network-move-set-MAC-and-set-nomaster-operations-out.patch:
    Revert patch due to users expecting previous buggy behavior
    (LP: #1937117)

 -- Dan Streetman <email address hidden> Wed, 21 Jul 2021 14:51:38 -0400

Source diff to previous version
1937117 misconfigured networkd may break after networkd restart

Version: 237-3ubuntu10.49 2021-07-20 19:06:23 UTC

  systemd (237-3ubuntu10.49) bionic-security; urgency=medium

    - debian/patches/CVE-2020-13529.patch: tentatively ignore FORCERENEW
      command in src/libsystemd-network/sd-dhcp-client.c.
    - CVE-2020-13529
  * SECURITY UPDATE: denial of service via stack exhaustion
    - debian/patches/CVE-2021-33910.patch: do not use strdupa() on a path
      in src/basic/unit-name.c.
    - CVE-2021-33910

 -- Marc Deslauriers <email address hidden> Fri, 09 Jul 2021 11:12:13 -0400

Source diff to previous version
CVE-2020-13529 An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP

Version: 237-3ubuntu10.48 2021-06-16 18:06:26 UTC

  systemd (237-3ubuntu10.48) bionic; urgency=medium

  * d/p/lp1925216-seccomp-rework-functions-for-parsing-system-call-fil.patch:
    Downgrade syscall group parsing failure logs to debug (LP: #1925216)
  * d/p/lp1929560-network-move-set-MAC-and-set-nomaster-operations-out.patch:
    Move link mac and master config out of link_up() (LP: #1929560)
  * d/p/resolved-Mitigate-DVE-2018-0001-by-retrying-NXDOMAIN-with.patch,
    - Use upstream patch for DVE-2018-0001 handling (LP: #1785383)

 -- Dan Streetman <email address hidden> Thu, 27 May 2021 11:18:38 -0400

Source diff to previous version
1925216 confusing but harmless warning messages printed about syscalls
1929560 link mac isn't set if already up

Version: 237-3ubuntu10.47 2021-05-06 11:07:16 UTC

  systemd (237-3ubuntu10.47) bionic; urgency=medium

  * d/p/network_always_drop_configs_when_interface_is_renamed.patch:
    Fix networkd renaming race condition (LP: #1923115)

 -- Seyeong Kim <email address hidden> Wed, 07 Apr 2021 15:11:17 +0900

Source diff to previous version
1923115 Networkd vs udev nic renaming race condition

Version: 237-3ubuntu10.46 2021-04-15 11:06:19 UTC

  systemd (237-3ubuntu10.46) bionic; urgency=medium

  * d/p/lp1916485-Newer-Glibc-use-faccessat2-to-implement-faccessat.patch:
    Add support for faccessat2 (LP: #1916485)
  * d/p/lp1918696-shared-seccomp-util-address-family-filtering-is-brok.patch:
    Stop attempting to restrict address families on ppc archs
    (LP: #1918696)
  * d/p/lp1891810-seccomp-util-add-new-syscalls-from-kernel-5.6-to-sys.patch:
    Add openat2() syscall to seccomp filter list
    (LP: #1891810)

 -- Dan Streetman <email address hidden> Wed, 17 Mar 2021 17:38:05 -0400

1918696 libseccomp 2.5.1 will break unit tests on ppc

About   -   Send Feedback to @ubuntu_updates