Linux repositories inspector

libsystemd0 - Component library for systemd

This library provides several of the systemd C APIs:
  • sd-bus implements an alternative D-Bus client library that is relatively easy to use, very efficient and supports both classic D-Bus as well as kdbus as transport backend.
  • sd-daemon(3): for system services (daemons) to report their status to systemd and to make easy use of socket-based activation logic
  • sd-event is a generic event loop abstraction that is built around Linux epoll, but adds features such as event prioritization or efficient timer handling.
  • sd-id128(3): generation and processing of 128-bit IDs
  • sd-journal(3): API to submit and query journal log entries
  • sd-login(3): APIs to introspect and monitor seat, login session and user status information on the local system.
241
Debian iconDebian 10.0
Debian iconDebian 9.0
OpenSUSE iconOpenSUSE Tumbleweed
240
Ubuntu iconUbuntu 19.04
239
Ubuntu iconUbuntu 18.10
237
Ubuntu iconUbuntu 18.04 LTS
234
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
Ubuntu iconUbuntu 17.10
232
Debian iconDebian 9.0
229
Ubuntu iconUbuntu 16.04 LTS
228
OpenSUSE iconOpenSUSE Leap 42.3
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb241-310.04.2019321 kiB766 kiB
Debian iconDebian 9.0 stretch/maindeb232-25+deb9u816.02.2019274 kiB654 kiB
Debian iconDebian 9.0 stretch-backports/maindeb241-1~bpo9+110.03.2019324 kiB773 kiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb232-25+deb9u1005.04.2019275 kiB654 kiB
OpenSUSE iconOpenSUSE Leap 15.0 ossrpm234-lp150.19.117.01.2019528 kiB592 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.9.118.01.2019535 kiB592 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.6.118.01.2019531 kiB592 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.3.118.01.2019529 kiB592 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.15.127.02.2019548 kiB592 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.12.129.01.2019546 kiB592 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 ossrpm234-lp151.25.714.03.2019547 kiB592 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 ossrpm228-27.217.01.2019505 kiB780 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-68.128.02.2019536 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-65.129.01.2019533 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-62.121.01.2019531 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-59.121.01.2019528 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-56.121.01.2019527 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-53.121.01.2019526 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-50.121.01.2019523 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-47.121.01.2019520 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-44.121.01.2019520 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-41.121.01.2019518 kiB788 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-38.121.01.2019511 kiB780 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-35.121.01.2019508 kiB780 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-32.221.01.2019507 kiB780 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-29.121.01.2019506 kiB780 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Tumbleweed ossrpm241-1.115.03.2019399 kiB732 kiBhttps://bugs.opensuse.org
Ubuntu iconUbuntu 17.10 artful/maindeb234-2ubuntu1210.11.2017203 kiB641 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb234-2ubuntu12.110.11.2017203 kiB641 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb234-2ubuntu12.412.06.2018204 kiB642 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb237-3ubuntu1012.06.2018199 kiB645 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-proposed/maindeb237-3ubuntu10.2008.04.2019200 kiB648 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb237-3ubuntu10.1908.04.2019199 kiB647 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb237-3ubuntu10.1908.04.2019199 kiB647 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb239-7ubuntu1014.01.2019207 kiB672 kiB
Ubuntu iconUbuntu 18.10 cosmic-proposed/maindeb239-7ubuntu10.1308.04.2019206 kiB674 kiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb239-7ubuntu10.1208.04.2019206 kiB674 kiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb239-7ubuntu10.1208.04.2019206 kiB674 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb240-6ubuntu410.04.2019237 kiB769 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb229-4ubuntu410.11.2017204 kiB615 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb229-4ubuntu21.2108.04.2019199 kiB620 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb229-4ubuntu21.2108.04.2019199 kiB620 kiB

Latest updates

Debian 10.0 icon

Debian 10.0 buster/main: Updated from 241-1 to 241-3

10.04.2019 17:07
Michael Biebl
  • Drop systemd-shim alternative from libpam-systemd.
    A fixed systemd-shim package which works with newer versions of systemd is unlikely to happen given that the systemd-shim package has been removed from the archive. Drop the alternative dependency from libpam-systemd accordingly.
  • Properly remove duplicate directories from systemd package. When removing duplicate directories from the systemd package, sort the list of directories in reverse order so we properly delete nested directories.
  • udev: Run programs in the specified order (Closes: #925190)
  • bash-completion: Use default completion for redirect operators (Closes: #924541)
  • networkd: Clarify that IPv6 RA uses our own stack, no the kernel's (Closes: #815582)
  • Revert "Drop systemd-timesyncd.service.d/disable-with-time-daemon.conf" Apparently Conflicts= are not a reliable mechanism to ensure alternative NTP implementations take precedence over systemd-timesyncd. (Closes: #902026)
  • network: Fix routing policy rule issue.
    When multiple links request a routing policy, make sure they are all applied correctly. (Closes: #924406)
  • pam-systemd: Use secure_getenv() rather than getenv() Fixes a vulnerability in the systemd PAM module which insecurely uses the environment and lacks seat verification permitting spoofing an active session to PolicyKit. (CVE-2019-3842)
Martin Pitt
  • Enable udev autopkgtest in containers.
    This test doesn't actually need udev.service (which is disabled in containers) and works fine in LXC.
  • Enable boot-and-service autopkgtest in containers
    • Skip tests which can't work in containers.
    • Add missing rsyslog test dependency.
    • e2scrub_reap.service fails in containers, ignore (filed as #926138)
    • Relax pgrep pattern for gdm, as there's no wayland session in containers.
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 removed

10.04.2019 14:39
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Updated from 240-6ubuntu3 to 240-6ubuntu4

10.04.2019 14:36
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 introduced

10.04.2019 08:45
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.20 introduced

08.04.2019 15:45
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/fix-test-22.patch
      • fix TEST-22 failures
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
      Dimitri John Ledkov
      • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.13 introduced

08.04.2019 15:25
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
    • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.11 to 239-7ubuntu10.12

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.19 to 229-4ubuntu21.21

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.17 to 237-3ubuntu10.19

08.04.2019 09:25
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 229-4ubuntu21.16 to 229-4ubuntu21.21

08.04.2019 08:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 237-3ubuntu10.13 to 237-3ubuntu10.19

08.04.2019 08:15
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-security/main: Updated from 239-7ubuntu10.8 to 239-7ubuntu10.12

08.04.2019 07:35
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.11 removed

06.04.2019 01:55
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.17 removed

06.04.2019 01:50
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 removed

06.04.2019 01:25
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 232-25+deb9u9 to 232-25+deb9u10

05.04.2019 05:18
  • journald: fix assertion failure on journal_file_link_data (Closes: #916880)
  • tmpfiles: fix "e" to support shell style globs (Closes: #918400)
  • mount-util: accept that name_to_handle_at() might fail with EPERM. Container managers frequently block name_to_handle_at(), returning EACCES or EPERM when this is issued. Accept that, and simply fall back to fdinfo-based checks. (Closes: #917122)
  • automount: ack automount requests even when already mounted. Fixes a race condition in systemd which could result in automount requests not being serviced and processes using them to hang, causing denial of service. (CVE-2018-1049)
  • core: when deserializing state always use read_line(…, LONG_LINE_MAX, …) Fixes improper serialization on upgrade which can influence systemd execution environment and lead to root privilege escalation. (CVE-2018-15686, Closes: #912005)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.17 to 229-4ubuntu21.19

04.04.2019 13:25
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.10 to 239-7ubuntu10.11

04.04.2019 13:20
  • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.15 to 237-3ubuntu10.17

04.04.2019 13:00
Michael Vogt
  • d/p/Support-system-image-read-only-etc.patch:
    • re-add support for /etc/writable for core18 (LP: #1778936)
  • d/p/fix-race-daemon-reload-8803.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 introduced

25.03.2019 15:15
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)

Related packages

libsystemd0-32bit - Component library for systemd
libsystemd0-32bit-debuginfo - Debug information for package libsystemd0
libsystemd0-debuginfo - Debug information for package libsystemd0
libsystemd0-debuginfo-32bit - Debug information for package libsystemd0
libsystemd0-mini - Component library for systemd
libsystemd0-mini-debuginfo - Debug information for package libsystemd0-mini
⇧ Top