UbuntuUpdates.org

Package "systemd-timesyncd"

Name: systemd-timesyncd

Description:

minimalistic service to synchronize local time with NTP servers

Latest version: 249.11-0ubuntu3.20
Release: jammy (22.04)
Level: updates
Repository: main
Head package: systemd
Homepage: https://www.freedesktop.org/wiki/Software/systemd

Links


Download "systemd-timesyncd"


Other versions of "systemd-timesyncd" in Jammy

Repository Area Version
base main 249.11-0ubuntu3
security main 249.11-0ubuntu3.19
proposed main 249.11-0ubuntu3.20

Changelog

Version: 249.11-0ubuntu3.20 2026-04-08 06:07:58 UTC

  systemd (249.11-0ubuntu3.20) jammy; urgency=medium

  * net_id: depending on new udev prop, include/exclude PCI domain from netif names
    (LP: #2134334)
  * network: support ID_NET_MANAGED_BY udev property
    (LP: #2133220)

 -- Robert Malz <email address hidden> Tue, 24 Mar 2026 09:52:29 -0400

Source diff to previous version
2134334 Add ID_NET_NAME_INCLUDE_DOMAIN property support to systemd
2133220 add ID_NET_MANAGED_BY property support to jammy

Version: 249.11-0ubuntu3.19 2026-03-24 09:07:57 UTC

  systemd (249.11-0ubuntu3.19) jammy-security; urgency=medium

  * SECURITY UPDATE: Local unprivileged user can overwrite stack in systemd
    - d/p/CVE-2026-29111-1.patch: path-util: backport path_startswith_full
    - d/p/CVE-2026-29111-2.patch: core/cgroup: avoid one unnecessary strjoina()
    - d/p/CVE-2026-29111-3.patch: core: validate input cgroup path more prudently
  * SECURITY UPDATE: Local root execution via malicious hardware devices
    - d/p/udev-check-for-invalid-chars-in-various-fields-received-f.patch
    - d/p/udev-fix-review-mixup.patch
    - No CVE number

 -- Nick Rosbrook <email address hidden> Fri, 13 Mar 2026 12:47:41 -0400

Source diff to previous version
CVE-2026-29111 systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data.

Version: 249.11-0ubuntu3.17 2025-10-08 19:07:11 UTC

  systemd (249.11-0ubuntu3.17) jammy; urgency=medium

  [ Nick Rosbrook ]
  * initramfs-tools: copy hwdb.bin to initramfs (LP: #2112237)
  * d/t/tests-in-lxd: drop patching workaround (LP: #2115263)
    - d/t/control: add Depends: dnsmasq-base
      (Revealed by test progressing past previous failure)

  [ Chengen Du ]
  * core/device: fix devlink handling (LP: #2100252)

 -- Nick Rosbrook <email address hidden> Tue, 26 Aug 2025 11:23:06 -0400

Source diff to previous version
2112237 hwdb.bin not available in initramfs
2115263 tests-in-lxd failing against new autopkgtest version
2100252 A reused mount point is removed after deactivating the original volume group

Version: 249.11-0ubuntu3.16 2025-06-09 19:07:21 UTC

  systemd (249.11-0ubuntu3.16) jammy-security; urgency=medium

  * SECURITY UPDATE: race condition in systemd-coredump
    - debian/patches/CVE_2025_4598_1.patch: coredump: get rid of
      _META_MANDATORY_MAX.
    - debian/patches/CVE_2025_4598_2.patch: coredump: use %d in kernel core
      pattern.
    - debian/patches/CVE_2025_4598_3.patch: coredump: get rid of a bogus
      assertion.
    - CVE-2025-4598

 -- Octavio Galland <email address hidden> Wed, 04 Jun 2025 11:17:43 -0300

Source diff to previous version
CVE-2025-4598 A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to

Version: 249.11-0ubuntu3.15 2025-04-01 11:07:20 UTC

  systemd (249.11-0ubuntu3.15) jammy; urgency=medium

  * d/systemd.prerm: call d-s-h update-state for resolved on upgrades
    (LP: #2078555)




About   -   Send Feedback to @ubuntu_updates