Linux repositories inspector

libudev1 - Dynamic library to access udev device information

This package contains the dynamic library libudev, which provides access to udev device information
244.2
Ubuntu iconUbuntu 20.04
244
Debian iconDebian 10.0
OpenSUSE iconOpenSUSE Tumbleweed
242
Ubuntu iconUbuntu 19.10
241
Debian iconDebian 10.0
Debian iconDebian 9.0
240
Ubuntu iconUbuntu 19.04
239
Ubuntu iconUbuntu 18.10
237
Ubuntu iconUbuntu 18.04 LTS
234
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
OpenSUSE iconOpenSUSE Leap 15.2
Ubuntu iconUbuntu 17.10
232
Debian iconDebian 9.0
229
Ubuntu iconUbuntu 16.04 LTS
228
OpenSUSE iconOpenSUSE Leap 42.3
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb241-7~deb10u3Feb 08147 kiB258 kiB
Debian iconDebian 10.0 buster-backports/maindeb244-3~bpo10+1Dec 30151 kiB265 kiB
Debian iconDebian 9.0 stretch/maindeb232-25+deb9u12Sep 07123 kiB224 kiB
Debian iconDebian 9.0 stretch-backports/maindeb241-5~bpo9+1Jun 17146 kiB258 kiB
OpenSUSE iconOpenSUSE Leap 15.0 ossrpm234-lp150.19.12019-01-17362 kiB134 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.9.12019-01-18369 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.6.12019-01-18364 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.3.12019-01-18362 kiB134 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.20.1Nov 09194 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.15.1Feb 27382 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm234-lp150.20.12.12019-01-29380 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 ossrpm234-lp151.25.7Mar 14381 kiB138 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 update/ossrpm234-lp151.26.7.1Feb 11198 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 update/ossrpm234-lp151.26.4.1Nov 05194 kiB138 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.2 ossrpm234-lp152.28.1Jan 07200 kiB138 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 ossrpm228-27.22019-01-17318 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-71.1Jun 17349 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-68.1Feb 28346 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-65.12019-01-29343 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-62.12019-01-21341 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-59.12019-01-21339 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-56.12019-01-21338 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-53.12019-01-21336 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-50.12019-01-21333 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-47.12019-01-21331 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-44.12019-01-21330 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-41.12019-01-21329 kiB130 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-38.12019-01-21325 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-35.12019-01-21322 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-32.22019-01-21321 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm228-29.12019-01-21320 kiB126 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Tumbleweed ossrpm244-2.11 - 01:40413 kiB170 kiBhttps://bugs.opensuse.org
Ubuntu iconUbuntu 17.10 artful/maindeb234-2ubuntu122017-11-1050.5 kiB213 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb234-2ubuntu12.12017-11-1050.6 kiB213 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb234-2ubuntu12.42018-06-1251.2 kiB214 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb237-3ubuntu102018-06-1252 kiB224 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-proposed/maindeb237-3ubuntu10.39Feb 0654.8 kiB231 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb237-3ubuntu10.38Feb 0554 kiB230 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb237-3ubuntu10.391 - 11:1554.8 kiB231 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb239-7ubuntu102019-01-1453.8 kiB234 kiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb239-7ubuntu10.12Apr 0852.8 kiB236 kiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb239-7ubuntu10.14Jun 1752.9 kiB236 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb240-6ubuntu5Jun 1763.3 kiB273 kiB
Ubuntu iconUbuntu 19.04 disco-security/maindeb240-6ubuntu5.7Sep 1062.1 kiB274 kiB
Ubuntu iconUbuntu 19.04 disco-updates/maindeb240-6ubuntu5.8Nov 2562.6 kiB275 kiB
Ubuntu iconUbuntu 19.10 eoan/maindeb242-7ubuntu3Oct 1474.6 kiB307 kiB
Ubuntu iconUbuntu 19.10 eoan-proposed/maindeb242-7ubuntu3.7Feb 0675.1 kiB309 kiB
Ubuntu iconUbuntu 19.10 eoan-security/maindeb242-7ubuntu3.6Feb 0574.9 kiB309 kiB
Ubuntu iconUbuntu 19.10 eoan-updates/maindeb242-7ubuntu3.71 - 10:4675.1 kiB309 kiB
Ubuntu iconUbuntu 20.04 focal/maindeb244.2-1ubuntu1Feb 1475.3 kiB320 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb229-4ubuntu42017-11-1057.7 kiB201 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb229-4ubuntu21.27Feb 0553.2 kiB207 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb229-4ubuntu21.27Feb 0553.2 kiB207 kiB

Latest updates

Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.38 to 237-3ubuntu10.39

1 - 11:15
Dariusz Gadomski
  • d/p/lp1762391/0001-Call-getgroups-to-know-size-of-supplementary-groups-.patch, d/p/lp1762391/0002-user-util-tweak-to-in_gid.patch,
    d/p/lp1762391/0003-user-util-Add-helper-functions-for-gid-lists-operati.patch, d/p/lp1762391/0004-execute-Restore-call-to-pam_setcred.patch, d/p/lp1762391/0005-execute-Detect-groups-added-by-PAM-and-merge-them-wi.patch, d/p/lp1762391/0006-test-Add-tests-for-gid-list-ops.patch, d/p/lp1762391/0007-execute-add-const-to-array-parameters-where-possible.patch, d/p/lp1762391/0008-execute-allow-pam_setcred-to-fail-ignore-errors.patch:
    • Restore call to pam_setcred (LP: #1762391)
    Ioanna Alifieraki
    • d/p/lp1860548/0001-Revert-Replace-use-of-snprintf-with-xsprintf.patch, d/p/lp1860548/0002-job-truncate-unit-description.patch:
      • use snprintf instead of xsprintf (LP: #1860548)
      Dan Streetman
      • d/p/lp1833193-network-update-address-when-static-address-was-alrea.patch:
        • Update lft when static addr was cfg by dhcp (LP: #1833193)
      • d/p/lp1849261/0001-core-when-we-can-t-enqueue-OnFailure-job-show-full-e.patch, d/p/lp1849261/0002-core-don-t-trigger-OnFailure-deps-when-a-unit-is-goi.patch:
        • Only trigger OnFailure= if Restart= is not in effect (LP: #1849261)
      • d/p/lp1671951-network-set-ipv6-mtu-after-link-up-or-device-mtu-cha.patch:
        • set ipv6 mtu at correct time (LP: #1671951)
      • d/p/lp1845909/0001-networkd-honour-LinkLocalAddressing.patch, d/p/lp1845909/0002-networkd-fix-link_up-12505.patch,
        d/p/lp1845909/0003-network-do-not-send-ipv6-token-to-kernel.patch, d/p/lp1845909/0004-network-rename-linux_configure_after_setting_mtu-to-linux.patch, d/p/lp1845909/0005-network-add-link-setting_genmode-flag.patch, d/p/lp1845909/0006-network-if-ipv6ll-is-disabled-enumerate-tentative-ipv6-ad.patch, d/p/lp1845909/0007-network-drop-foreign-config-after-addr_gen_mode-has-been-.patch, d/p/lp1845909/0008-network-drop-IPv6LL-address-when-LinkLocalAddressing.patch:
        • if LinkLocalAddressing=no prevent creation of ipv6ll (LP: #1845909)
      • d/p/lp1859862-network-Do-not-disable-IPv6-by-writing-to-sysctl.patch:
        • enable ipv6 when needed (LP: #1859862)
      • d/p/lp1836695-networkd-Add-back-static-routes-after-DHCPv4-lease-e.patch:
        • (re)add static routes after getting dhcp4 addr (LP: #1836695)
      • d/t/storage:
        • fix buggy test (LP: #1831459)
        • without scsi_debug, skip test (LP: #1847816)
Ubuntu icon

Ubuntu 19.10 eoan-updates/main: Updated from 242-7ubuntu3.6 to 242-7ubuntu3.7

1 - 10:46
Dariusz Gadomski
  • d/p/lp1762391/0001-Call-getgroups-to-know-size-of-supplementary-groups-.patch, d/p/lp1762391/0002-user-util-tweak-to-in_gid.patch,
    d/p/lp1762391/0003-user-util-Add-helper-functions-for-gid-lists-operati.patch, d/p/lp1762391/0004-execute-Restore-call-to-pam_setcred.patch, d/p/lp1762391/0005-execute-Detect-groups-added-by-PAM-and-merge-them-wi.patch, d/p/lp1762391/0006-test-Add-tests-for-gid-list-ops.patch, d/p/lp1762391/0007-execute-add-const-to-array-parameters-where-possible.patch, d/p/lp1762391/0008-execute-allow-pam_setcred-to-fail-ignore-errors.patch:
    • Restore call to pam_setcred (LP: #1762391)
    • d/p/lp1846232/0001-network-honor-MTUBytes-setting.patch,
      d/p/lp1846232/0002-network-bump-MTU-bytes-only-when-MTUByte-is-not-set.patch:
      • do not always bump MTU with additional 4bytes (LP: #1846232)
    • d/p/lp1671951-network-set-ipv6-mtu-after-link-up-or-device-mtu-cha.patch:
      • set ipv6 mtu at correct time (LP: #1671951)
    • d/p/lp1845909/0001-network-rename-linux_configure_after_setting_mtu-to-linux.patch, d/p/lp1845909/0002-network-add-link-setting_genmode-flag.patch, d/p/lp1845909/0003-network-if-ipv6ll-is-disabled-enumerate-tentative-ipv6-ad.patch, d/p/lp1845909/0004-network-drop-foreign-config-after-addr_gen_mode-has-been-.patch, d/p/lp1845909/0005-network-drop-IPv6LL-address-when-LinkLocalAddressing.patch:
      • drop foreign config and raise interface after setting genmode (LP: #1845909)
    • d/t/storage: without scsi_debug, skip test (LP: #1847816)
OpenSUSE icon

OpenSUSE Tumbleweed oss: Updated from 244-1.4 to 244-2.1

1 - 01:40
  • Import commit f8adabc2b1f3e3ad150e7a3bfa88341eda5a8a57 (merge v244.2) 77c04ce5c2 hwdb: update to v245-rc1
    b4eb884824 Fix typo in function name
    e2d4cb9843 polkit: when authorizing via PK let's re-resolve callback/userdata instead of caching it 83bfc0d8dd sd-bus: introduce API for re-enqueuing incoming messages 5926f9f172 polkit: use structured initialization
    0697d0d972 polkit: on async pk requests, re-validate action/details 2589995acd polkit: reuse some common bus message appending code 5b2442d5c3 bus-polkit: rename return error parameter to ret_error 0a19ff7004 shared: split out polkit stuff from bus-util.c ? bus-polkit.c 1325dfb577 test: adapt to the new capsh format
    3538fafb47 meson: update efi path detection to gnu-efi-3.0.11 3034855a5b presets: "disable" all passive targets by default c2e3046819 shared/sysctl-util: normalize repeated slashes or dots to a single value 6f4364046f dhcp6: do not use T1 and T2 longer than one provided by the lease 0ed6cda28d network: fix implicit type conversion warning by GCC-10 f6a5c02d26 bootspec: parse random-seed-mode line in loader.conf ddc5dca8a7 sd-boot: fix typo
    2bbbe9ae41 test: Synchronize journal before reading from it 072485d661 sd-bus: fix introspection bug in signal parameter names 80af3cf5e3 efi: fix build.
    ...
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 244.2-1ubuntu1 removed

Feb 14
Ubuntu icon

Ubuntu 20.04 focal/main: Updated from 244.1-0ubuntu3 to 244.2-1ubuntu1

Feb 14
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 244.2-1ubuntu1 introduced

Feb 11
Ubuntu icon

Ubuntu 20.04 focal/main: Updated from 244.1-0ubuntu2 to 244.1-0ubuntu3

Feb 11
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 244.1-0ubuntu3 removed

Feb 11
OpenSUSE icon

OpenSUSE Leap 15.1 update/oss: Updated from 234-lp151.26.4.1 to 234-lp151.26.7.1

Feb 11
  • Fix bsc#1162108 CVE-2020-1712
    Add 0001-polkit-on-async-pk-requests-re-validate-action-detai.patch Add 0002-sd-bus-introduce-API-for-re-enqueuing-incoming-messa.patch Add 0003-polkit-when-authorizing-via-PK-let-s-re-resolve-call.patch
OpenSUSE icon

OpenSUSE Tumbleweed oss: Updated from 244-1.2 to 244-1.4

Feb 09
  • Temporarily restore /sbin/{udevd,udevadm) obsolete symlinks They're restored until YaST stop using them (see boo#1160890)
Debian icon

Debian 10.0 buster-proposed-updates/main: Version 241-7~deb10u3 removed

Feb 08
Debian icon

Debian 10.0 buster/main: Updated from 241-7~deb10u2 to 241-7~deb10u3

Feb 08
  • core: set fs.file-max sysctl to LONG_MAX rather than ULONG_MAX. Since kernel 5.2 (but also stable kernels like 4.19.53) the kernel thankfully returns proper errors when we write a value out of range to the sysctl. Which however breaks writing ULONG_MAX to request the maximum value. Hence let's write the new maximum value instead, LONG_MAX. (Closes: #945018)
  • core: change ownership/mode of the execution directories also for static users.
    This ensures that execution directories like CacheDirectory and StateDirectory are properly chowned to the user specified in User= before launching the service. (Closes: #919231)
Ubuntu icon

Ubuntu 18.04 LTS bionic-proposed/main: Updated from 237-3ubuntu10.34 to 237-3ubuntu10.39

Feb 06
Dariusz Gadomski
  • d/p/lp1762391/0001-Call-getgroups-to-know-size-of-supplementary-groups-.patch, d/p/lp1762391/0002-user-util-tweak-to-in_gid.patch,
    d/p/lp1762391/0003-user-util-Add-helper-functions-for-gid-lists-operati.patch, d/p/lp1762391/0004-execute-Restore-call-to-pam_setcred.patch, d/p/lp1762391/0005-execute-Detect-groups-added-by-PAM-and-merge-them-wi.patch, d/p/lp1762391/0006-test-Add-tests-for-gid-list-ops.patch, d/p/lp1762391/0007-execute-add-const-to-array-parameters-where-possible.patch, d/p/lp1762391/0008-execute-allow-pam_setcred-to-fail-ignore-errors.patch:
    • Restore call to pam_setcred (LP: #1762391)
    Ioanna Alifieraki
    • d/p/lp1860548/0001-Revert-Replace-use-of-snprintf-with-xsprintf.patch, d/p/lp1860548/0002-job-truncate-unit-description.patch:
      • use snprintf instead of xsprintf (LP: #1860548)
      Dan Streetman
      • d/p/lp1833193-network-update-address-when-static-address-was-alrea.patch:
        • Update lft when static addr was cfg by dhcp (LP: #1833193)
      • d/p/lp1849261/0001-core-when-we-can-t-enqueue-OnFailure-job-show-full-e.patch, d/p/lp1849261/0002-core-don-t-trigger-OnFailure-deps-when-a-unit-is-goi.patch:
        • Only trigger OnFailure= if Restart= is not in effect (LP: #1849261)
      • d/p/lp1671951-network-set-ipv6-mtu-after-link-up-or-device-mtu-cha.patch:
        • set ipv6 mtu at correct time (LP: #1671951)
      • d/p/lp1845909/0001-networkd-honour-LinkLocalAddressing.patch, d/p/lp1845909/0002-networkd-fix-link_up-12505.patch,
        d/p/lp1845909/0003-network-do-not-send-ipv6-token-to-kernel.patch, d/p/lp1845909/0004-network-rename-linux_configure_after_setting_mtu-to-linux.patch, d/p/lp1845909/0005-network-add-link-setting_genmode-flag.patch, d/p/lp1845909/0006-network-if-ipv6ll-is-disabled-enumerate-tentative-ipv6-ad.patch, d/p/lp1845909/0007-network-drop-foreign-config-after-addr_gen_mode-has-been-.patch, d/p/lp1845909/0008-network-drop-IPv6LL-address-when-LinkLocalAddressing.patch:
        • if LinkLocalAddressing=no prevent creation of ipv6ll (LP: #1845909)
      • d/p/lp1859862-network-Do-not-disable-IPv6-by-writing-to-sysctl.patch:
        • enable ipv6 when needed (LP: #1859862)
      • d/p/lp1836695-networkd-Add-back-static-routes-after-DHCPv4-lease-e.patch:
        • (re)add static routes after getting dhcp4 addr (LP: #1836695)
      • d/t/storage:
        • fix buggy test (LP: #1831459)
        • without scsi_debug, skip test (LP: #1847816)
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 244.1-0ubuntu3 introduced

Feb 05
Ubuntu icon

Ubuntu 19.10 eoan-updates/main: Updated from 242-7ubuntu3.2 to 242-7ubuntu3.6

Feb 05
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
  • This package does _not_ contain the changes from 242-7ubuntu3.3 in eoan-proposed.
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.23 to 229-4ubuntu21.27

Feb 05
  • SECURITY UPDATE: incorrect PIDFile verification
    • debian/patches/CVE-2018-16888.patch: be stricter when handling PID files and MAINPID sd_notify() messages in man/systemd.service.xml, src/core/manager.c, src/core/service.c, src/core/unit.h, test/TEST-20-MAINPIDGAMES/Makefile,
      test/TEST-20-MAINPIDGAMES/test.sh,
      test/TEST-20-MAINPIDGAMES/testsuite.sh, test/test-functions.
    • debian/patches/CVE-2018-16888-2.patch: relax PID file symlink chain checks a bit in src/core/service.c.
    • CVE-2018-16888
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 237-3ubuntu10.29 to 237-3ubuntu10.38

Feb 05
  • SECURITY UPDATE: local privilege escalation via DynamicUser
    • debian/patches/CVE-2019-384x-1.patch: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid/sgid files in src/shared/seccomp-util.c, src/shared/seccomp-util.h.
    • debian/patches/CVE-2019-384x-2.patch: add test case for restrict_suid_sgid() in src/test/test-seccomp.c.
    • debian/patches/CVE-2019-384x-3.patch: expose SUID/SGID restriction as new unit setting RestrictSUIDSGID= in src/core/dbus-execute.c, src/core/execute.c, src/core/execute.h,
      src/core/load-fragment-gperf.gperf.m4, src/shared/bus-unit-util.c.
    • debian/patches/CVE-2019-384x-4.patch: document the new RestrictSUIDSGID= setting in man/systemd.exec.xml.
    • debian/patches/CVE-2019-384x-5.patch: turn on RestrictSUIDSGID= in most of our long-running daemons in units/systemd-*.service.in.
    • debian/patches/CVE-2019-384x-6.patch: imply NNP and SUID/SGID restriction for DynamicUser=yes service in man/systemd.exec.xml, src/core/unit.c.
    • debian/patches/CVE-2019-384x-7.patch: fix compilation on arm64 in src/test/test-seccomp.c.
    • CVE-2019-3843
    • CVE-2019-3844
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
  • This package does _not_ contain the changes from 237-3ubuntu10.34 in bionic-proposed.
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.33 to 237-3ubuntu10.38

Feb 05
  • SECURITY UPDATE: local privilege escalation via DynamicUser
    • debian/patches/CVE-2019-384x-1.patch: introduce seccomp_restrict_suid_sgid() for blocking chmod() for suid/sgid files in src/shared/seccomp-util.c, src/shared/seccomp-util.h.
    • debian/patches/CVE-2019-384x-2.patch: add test case for restrict_suid_sgid() in src/test/test-seccomp.c.
    • debian/patches/CVE-2019-384x-3.patch: expose SUID/SGID restriction as new unit setting RestrictSUIDSGID= in src/core/dbus-execute.c, src/core/execute.c, src/core/execute.h,
      src/core/load-fragment-gperf.gperf.m4, src/shared/bus-unit-util.c.
    • debian/patches/CVE-2019-384x-4.patch: document the new RestrictSUIDSGID= setting in man/systemd.exec.xml.
    • debian/patches/CVE-2019-384x-5.patch: turn on RestrictSUIDSGID= in most of our long-running daemons in units/systemd-*.service.in.
    • debian/patches/CVE-2019-384x-6.patch: imply NNP and SUID/SGID restriction for DynamicUser=yes service in man/systemd.exec.xml, src/core/unit.c.
    • debian/patches/CVE-2019-384x-7.patch: fix compilation on arm64 in src/test/test-seccomp.c.
    • CVE-2019-3843
    • CVE-2019-3844
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
  • This package does _not_ contain the changes from 237-3ubuntu10.34 in bionic-proposed.
Ubuntu icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 229-4ubuntu21.21 to 229-4ubuntu21.27

Feb 05
  • SECURITY UPDATE: incorrect PIDFile verification
    • debian/patches/CVE-2018-16888.patch: be stricter when handling PID files and MAINPID sd_notify() messages in man/systemd.service.xml, src/core/manager.c, src/core/service.c, src/core/unit.h, test/TEST-20-MAINPIDGAMES/Makefile,
      test/TEST-20-MAINPIDGAMES/test.sh,
      test/TEST-20-MAINPIDGAMES/testsuite.sh, test/test-functions.
    • debian/patches/CVE-2018-16888-2.patch: relax PID file symlink chain checks a bit in src/core/service.c.
    • CVE-2018-16888
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
Ubuntu icon

Ubuntu 19.10 eoan-security/main: Version 242-7ubuntu3.6 introduced

Feb 05
  • SECURITY UPDATE: memory leak in button_open
    • debian/patches/CVE-2019-20386.patch: fix event in
      src/login/logind-button.c.
    • CVE-2019-20386
  • SECURITY UPDATE: heap use-after-free with async polkit queries
    • debian/patches/CVE-2020-1712-1.patch: on async pk requests, re-validate action/details in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-2.patch: introduce API for re-enqueuing incoming messages in src/libsystemd/libsystemd.sym,
      src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h.
    • debian/patches/CVE-2020-1712-3.patch: when authorizing via PK re-resolve callback/userdata instead of caching it in src/shared/bus-util.c.
    • debian/patches/CVE-2020-1712-4.patch: fix typo in function name in src/libsystemd/libsystemd.sym, src/libsystemd/sd-bus/sd-bus.c, src/systemd/sd-bus.h, src/shared/bus-util.c.
    • debian/libsystemd0.symbols: added new symbols.
    • CVE-2020-1712
  • This package does _not_ contain the changes from 242-7ubuntu3.3 in eoan-proposed.

Related packages

libudev1-32bit - Dynamic library to access udev device information
libudev1-32bit-debuginfo - Debug information for package libudev1
libudev1-debuginfo - Debug information for package libudev1
libudev1-debuginfo-32bit - Debug information for package libudev1
⇧ Top