Package "systemd"

Name: systemd


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • nss module to resolve names via systemd-resolved
  • tools for storing and retrieving coredumps
  • tools for sending and receiving remote journal logs
  • tests for systemd

Latest version: 245.4-4ubuntu3.11
Release: focal (20.04)
Level: security
Repository: universe


Other versions of "systemd" in Focal

Repository Area Version
base universe 245.4-4ubuntu3
base main 245.4-4ubuntu3
security main 245.4-4ubuntu3.11
updates main 245.4-4ubuntu3.13
updates universe 245.4-4ubuntu3.13

Packages in group

Deleted packages are displayed in grey.


Version: 245.4-4ubuntu3.11 2021-07-22 02:06:27 UTC

  systemd (245.4-4ubuntu3.11) focal-security; urgency=medium

  * d/p/lp1937117/0001-revert-lp1929560-network-move-set-MAC-and-set-nomaster-operations-out.patch,
    - Don't change interface master if interface is already up,
      due to users expecting previous buggy behavior (LP: #1937117)

 -- Dan Streetman <email address hidden> Wed, 21 Jul 2021 15:00:21 -0400

Source diff to previous version
1937117 misconfigured networkd may break after networkd restart

Version: 245.4-4ubuntu3.10 2021-07-20 17:06:42 UTC

  systemd (245.4-4ubuntu3.10) focal-security; urgency=medium

    - debian/patches/CVE-2020-13529.patch: tentatively ignore FORCERENEW
      command in src/libsystemd-network/sd-dhcp-client.c.
    - CVE-2020-13529
  * SECURITY UPDATE: denial of service via stack exhaustion
    - debian/patches/CVE-2021-33910.patch: do not use strdupa() on a path
      in src/basic/unit-name.c.
    - CVE-2021-33910

 -- Marc Deslauriers <email address hidden> Tue, 20 Jul 2021 07:39:51 -0400

CVE-2020-13529 An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP

About   -   Send Feedback to @ubuntu_updates