Linux repositories inspector

libudev1 - Dynamic library to access udev device information

This package contains the dynamic library libudev, which provides access to udev device information
241
Debian iconDebian 10.0
Debian iconDebian 9.0
OpenSUSE iconOpenSUSE Tumbleweed
240
Ubuntu iconUbuntu 19.04
239
Ubuntu iconUbuntu 18.10
237
Ubuntu iconUbuntu 18.04 LTS
234
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
Ubuntu iconUbuntu 17.10
232
Debian iconDebian 9.0
229
Ubuntu iconUbuntu 16.04 LTS
228
OpenSUSE iconOpenSUSE Leap 42.3
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb241-310.04.2019145 kiB257 kiB
Debian iconDebian 9.0 stretch/maindeb232-25+deb9u816.02.2019122 kiB224 kiB
Debian iconDebian 9.0 stretch-backports/maindeb241-1~bpo9+110.03.2019144 kiB256 kiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb232-25+deb9u1005.04.2019123 kiB224 kiB
OpenSUSE iconOpenSUSE Leap 15.0 ossrpm234-lp150.19.117.01.2019362 kiB134 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.9.118.01.2019369 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.6.118.01.2019364 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.3.118.01.2019362 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.15.127.02.2019382 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.12.129.01.2019380 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 ossrpm234-lp151.25.714.03.2019381 kiB138 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 ossrpm228-27.217.01.2019318 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-68.128.02.2019346 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-65.129.01.2019343 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-62.121.01.2019341 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-59.121.01.2019339 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-56.121.01.2019338 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-53.121.01.2019336 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-50.121.01.2019333 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-47.121.01.2019331 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-44.121.01.2019330 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-41.121.01.2019329 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-38.121.01.2019325 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-35.121.01.2019322 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-32.221.01.2019321 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-29.121.01.2019320 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Tumbleweed ossrpm241-1.115.03.2019200 kiB178 kiBhttps://bugs.opensuse.org
Ubuntu iconUbuntu 17.10 artful/maindeb234-2ubuntu1210.11.201750.5 kiB213 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb234-2ubuntu12.110.11.201750.6 kiB213 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb234-2ubuntu12.412.06.201851.2 kiB214 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb237-3ubuntu1012.06.201852 kiB224 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-proposed/maindeb237-3ubuntu10.2008.04.201952.7 kiB227 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb237-3ubuntu10.1908.04.201952.3 kiB226 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb237-3ubuntu10.1908.04.201952.3 kiB226 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb239-7ubuntu1014.01.201953.8 kiB234 kiB
Ubuntu iconUbuntu 18.10 cosmic-proposed/maindeb239-7ubuntu10.1308.04.201953 kiB236 kiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb239-7ubuntu10.1208.04.201952.8 kiB236 kiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb239-7ubuntu10.1208.04.201952.8 kiB236 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb240-6ubuntu410.04.201961.9 kiB272 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb229-4ubuntu410.11.201757.7 kiB201 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb229-4ubuntu21.2108.04.201952.4 kiB206 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb229-4ubuntu21.2108.04.201952.4 kiB206 kiB

Latest updates

Debian 10.0 icon

Debian 10.0 buster/main: Updated from 241-1 to 241-3

10.04.2019 17:07
Michael Biebl
  • Drop systemd-shim alternative from libpam-systemd.
    A fixed systemd-shim package which works with newer versions of systemd is unlikely to happen given that the systemd-shim package has been removed from the archive. Drop the alternative dependency from libpam-systemd accordingly.
  • Properly remove duplicate directories from systemd package. When removing duplicate directories from the systemd package, sort the list of directories in reverse order so we properly delete nested directories.
  • udev: Run programs in the specified order (Closes: #925190)
  • bash-completion: Use default completion for redirect operators (Closes: #924541)
  • networkd: Clarify that IPv6 RA uses our own stack, no the kernel's (Closes: #815582)
  • Revert "Drop systemd-timesyncd.service.d/disable-with-time-daemon.conf" Apparently Conflicts= are not a reliable mechanism to ensure alternative NTP implementations take precedence over systemd-timesyncd. (Closes: #902026)
  • network: Fix routing policy rule issue.
    When multiple links request a routing policy, make sure they are all applied correctly. (Closes: #924406)
  • pam-systemd: Use secure_getenv() rather than getenv() Fixes a vulnerability in the systemd PAM module which insecurely uses the environment and lacks seat verification permitting spoofing an active session to PolicyKit. (CVE-2019-3842)
Martin Pitt
  • Enable udev autopkgtest in containers.
    This test doesn't actually need udev.service (which is disabled in containers) and works fine in LXC.
  • Enable boot-and-service autopkgtest in containers
    • Skip tests which can't work in containers.
    • Add missing rsyslog test dependency.
    • e2scrub_reap.service fails in containers, ignore (filed as #926138)
    • Relax pgrep pattern for gdm, as there's no wayland session in containers.
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 removed

10.04.2019 14:39
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Updated from 240-6ubuntu3 to 240-6ubuntu4

10.04.2019 14:36
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 introduced

10.04.2019 08:45
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.20 introduced

08.04.2019 15:45
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/fix-test-22.patch
      • fix TEST-22 failures
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
      Dimitri John Ledkov
      • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.13 introduced

08.04.2019 15:25
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
    • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.11 to 239-7ubuntu10.12

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.19 to 229-4ubuntu21.21

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.17 to 237-3ubuntu10.19

08.04.2019 09:25
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 229-4ubuntu21.16 to 229-4ubuntu21.21

08.04.2019 08:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 237-3ubuntu10.13 to 237-3ubuntu10.19

08.04.2019 08:15
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-security/main: Updated from 239-7ubuntu10.8 to 239-7ubuntu10.12

08.04.2019 07:35
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.11 removed

06.04.2019 01:55
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.17 removed

06.04.2019 01:50
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 removed

06.04.2019 01:25
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 232-25+deb9u9 to 232-25+deb9u10

05.04.2019 05:18
  • journald: fix assertion failure on journal_file_link_data (Closes: #916880)
  • tmpfiles: fix "e" to support shell style globs (Closes: #918400)
  • mount-util: accept that name_to_handle_at() might fail with EPERM. Container managers frequently block name_to_handle_at(), returning EACCES or EPERM when this is issued. Accept that, and simply fall back to fdinfo-based checks. (Closes: #917122)
  • automount: ack automount requests even when already mounted. Fixes a race condition in systemd which could result in automount requests not being serviced and processes using them to hang, causing denial of service. (CVE-2018-1049)
  • core: when deserializing state always use read_line(…, LONG_LINE_MAX, …) Fixes improper serialization on upgrade which can influence systemd execution environment and lead to root privilege escalation. (CVE-2018-15686, Closes: #912005)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.17 to 229-4ubuntu21.19

04.04.2019 13:25
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.10 to 239-7ubuntu10.11

04.04.2019 13:20
  • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.15 to 237-3ubuntu10.17

04.04.2019 13:00
Michael Vogt
  • d/p/Support-system-image-read-only-etc.patch:
    • re-add support for /etc/writable for core18 (LP: #1778936)
  • d/p/fix-race-daemon-reload-8803.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 introduced

25.03.2019 15:15
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)

Related packages

libudev1-32bit - Dynamic library to access udev device information
libudev1-32bit-debuginfo - Debug information for package libudev1
libudev1-debuginfo - Debug information for package libudev1
libudev1-debuginfo-32bit - Debug information for package libudev1
⇧ Top