systemd-python vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the systemd-python package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2023-26604

*
  • M
Information Exposure

*
  • M
Deadlock

*
  • M
Off-by-one Error

*
  • H
Use After Free

<0:219-78.el7_9.7
  • M
Uncontrolled Recursion

*
  • M
Out-of-bounds Read

<0:219-62.el7_6.11
  • M
Out-of-bounds Read

<0:219-62.el7_6.11
  • M
Out-of-bounds Read

<0:219-67.el7
  • M
Out-of-bounds Read

<0:219-67.el7
  • M
Out-of-bounds Read

<0:219-62.el7_6.11
  • M
Out-of-bounds Read

<0:219-62.el7_6.11
  • M
Out-of-bounds Read

<0:219-42.el7_4.20
  • M
Out-of-bounds Read

<0:219-42.el7_4.20
  • M
Out-of-bounds Read

<0:219-67.el7
  • M
Out-of-bounds Read

<0:219-67.el7
  • M
Out-of-bounds Read

<0:219-42.el7_4.20
  • M
Out-of-bounds Read

<0:219-57.el7_5.9
  • M
Out-of-bounds Read

<0:219-67.el7
  • M
Execution with Unnecessary Privileges

<0:219-67.el7
  • M
Execution with Unnecessary Privileges

<0:219-67.el7
  • M
Execution with Unnecessary Privileges

<0:219-67.el7
  • M
Execution with Unnecessary Privileges

<0:219-67.el7
  • M
Execution with Unnecessary Privileges

<0:219-67.el7
  • M
Improper Input Validation

<0:219-62.el7_6.11
  • M
Improper Input Validation

<0:219-67.el7
  • M
Improper Input Validation

<0:219-67.el7
  • M
Improper Input Validation

<0:219-67.el7
  • M
Improper Input Validation

<0:219-42.el7_4.20
  • M
Improper Input Validation

<0:219-57.el7_5.9
  • M
Improper Input Validation

<0:219-62.el7_6.11
  • M
Improper Input Validation

<0:219-42.el7_4.20
  • M
Improper Input Validation

<0:219-67.el7
  • M
Improper Input Validation

<0:219-62.el7_6.11
  • M
Improper Input Validation

<0:219-67.el7
  • M
Improper Input Validation

<0:219-62.el7_6.11
  • M
Improper Input Validation

<0:219-42.el7_4.20
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • L
Memory Leak

<0:219-62.el7_6.3
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-57.el7_5.5
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-57.el7_5.5
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-42.el7_4.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-30.el7_3.13
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • H
Incorrect Calculation of Buffer Size

<0:219-62.el7_6.2
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Race Condition

<0:219-42.el7_4.7
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-19.el7_2.18
  • M
Reachable Assertion

<0:219-19.el7_2.18
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-19.el7_2.18
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-19.el7_2.18
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • M
Reachable Assertion

<0:219-30.el7_3.3
  • L
Resource Exhaustion

<0:219-78.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:219-19.el7
  • M
Incorrect Check of Function Return Value

<0:208-20.el7_1.9
  • M
Expected Behavior Violation

*
  • M
Incorrect Authorization

*
  • M
Link Following

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-42.el7_4.16
  • H
Improper Input Validation

<0:219-30.el7_3.14
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-30.el7_3.14
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-42.el7_4.16
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-42.el7_4.16
  • H
Improper Input Validation

<0:219-62.el7_6.5
  • H
Improper Input Validation

<0:219-30.el7_3.14
  • H
Improper Input Validation

<0:219-42.el7_4.16
  • H
Improper Input Validation

<0:219-57.el7_5.6
  • L
Information Exposure

*
  • M
Missing Authentication for Critical Function

*
  • M
Time-of-check Time-of-use (TOCTOU)

*