UbuntuUpdates.org

Package "systemd"

Name: systemd

Description:

system and service manager

Latest version: 229-4ubuntu21.17
Release: xenial (16.04)
Level: updates
Repository: main
Homepage: http://www.freedesktop.org/wiki/Software/systemd

Links

Save this URL for the latest version of "systemd": https://www.ubuntuupdates.org/systemd


Download "systemd"


Other versions of "systemd" in Xenial

Repository Area Version
base universe 229-4ubuntu4
base main 229-4ubuntu4
security universe 229-4ubuntu21.16
security main 229-4ubuntu21.16
updates universe 229-4ubuntu21.17
PPA: Mint upstream 204-5ubuntu20.15linuxmint1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 229-4ubuntu21.8 2018-11-12 16:06:25 UTC

  systemd (229-4ubuntu21.8) xenial-security; urgency=medium

  * SECURITY UPDATE: reexec state injection
    - debian/patches/CVE-2018-15686.patch: when deserializing state always use
      read_line(…, LONG_LINE_MAX, …) rather than fgets()
    - CVE-2018-15686
  * SECURITY UPDATE: symlink mishandling in systemd-tmpfiles
    - debian/patches/CVE-2018-6954.patch: don't resolve pathnames when traversing
      recursively through directory trees
    - CVE-2018-6954

 -- Chris Coulson <email address hidden> Thu, 08 Nov 2018 00:01:30 +0000

Source diff to previous version
CVE-2018-15686 A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be
CVE-2018-6954 systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of

Version: 229-4ubuntu21.6 2018-11-05 16:06:54 UTC

  systemd (229-4ubuntu21.6) xenial-security; urgency=medium

  * SECURITY UPDATE: buffer overflow in dhcp6 client
    - debian/patches/CVE-2018-15688.patch: make sure we have enough space
      for the DHCP6 option header in src/libsystemd-network/dhcp6-option.c.
    - CVE-2018-15688

 -- Marc Deslauriers <email address hidden> Wed, 31 Oct 2018 11:39:02 -0400

Source diff to previous version
CVE-2018-15688 A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected

Version: 229-4ubuntu21.5 2018-10-24 21:06:54 UTC

  systemd (229-4ubuntu21.5) xenial; urgency=medium

  [ Dimitri John Ledkov ]
  * systemctl: correctly proceed to immediate shutdown if scheduling fails
    (LP: #1670291)
  * hwdb: update micmute on Dell laptops. (LP: #1738153)
  * hwdb: Use wlan keycode for all Dell systems. (LP: #1762385)
  * units: Disable journald Watchdog (LP: #1773148)

  [ Mauricio Faria de Oliveira ]
  * core: Fix for service to enter the 'failed' state (rather than 'inactive') after it repeatedly fails restart.
    (LP: #1795658)

  [ Dimitri John Ledkov ]
  * Disable dh_installinit generation of tmpfiles for the systemd package.
    (LP: #1748147)

 -- Dimitri John Ledkov <email address hidden> Mon, 08 Oct 2018 16:10:42 +0100

Source diff to previous version
1670291 Landscape: Upgrade 14.04.5 to 16.04.2 fails unable to reboot
1738153 need backport the new scancode of dell-wmi for Microphone mute hotkey to xenial
1762385 dell_wmi: Unknown key codes
1773148 /lib/systemd/systemd-journald:6:fsync:fsync_directory_of_file:journal_file_rotate:do_rotate:server_rotate
1795658 xenial systemd reports 'inactive' instead of 'failed' for service units that repeatedly failed to restart / failed permanently

Version: 229-4ubuntu21.4 2018-07-31 00:06:43 UTC

  systemd (229-4ubuntu21.4) xenial; urgency=medium

  * debian/extra/start-udev: test that sync parameters file is writable, before
    writing to it. On old kernels (e.g. v4.4) the file is available but is
    read-only, thus writing to it causes init to fail and thus raise a kernel
    panic. As an extra caution ignore failures to write into that file anyway,
    since synchronous scsi probing is not critical enough to prevent starting
    d-i. LP: #1784454

 -- Dimitri John Ledkov <email address hidden> Mon, 30 Jul 2018 19:58:15 +0100

Source diff to previous version
1784454 kernel panic on booting kernel 4.4 based d-i from 16.04.5 RC image

Version: 229-4ubuntu21.3 2018-07-30 11:06:37 UTC

  systemd (229-4ubuntu21.3) xenial; urgency=medium

  [ Dimitri John Ledkov ]
  * udev-udeb: ship modprobe.d snippet to force scsi_mod.scan=sync in d-i.

  [ Adam Conrad ]
  * debian/extra/start-udev: Set scsi_mod scan=sync even if it's builtin
    to the kernel (we previously only set it in modprobe.d) LP: #1779815

 -- Adam Conrad <email address hidden> Thu, 26 Jul 2018 04:00:09 -0600

1779815 [Ubuntu 18.04.01][BostonLC][mpt3sas] installer does not detect any LSI based SAS/md raid device



About   -   Send Feedback to @ubuntu_updates