systemd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the systemd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-26604

<0:239-58.el8_6.13
  • M
Information Exposure

<0:239-58.el8_6.13
  • M
Off-by-one Error

<0:239-58.el8_6.13
  • M
CVE-2023-26604

<0:239-58.el8_6.13
  • M
Information Exposure

<0:239-58.el8_6.13
  • M
Off-by-one Error

<0:239-58.el8_6.13
  • M
CVE-2023-26604

<0:239-58.el8_6.13
  • M
Information Exposure

<0:239-58.el8_6.13
  • M
Off-by-one Error

<0:239-58.el8_6.13
  • M
CVE-2023-26604

<0:239-58.el8_6.13
  • M
Information Exposure

<0:239-58.el8_6.13
  • M
Off-by-one Error

<0:239-58.el8_6.13
  • M
Man-in-the-Middle (MitM)

<0:239-82.el8
  • M
Resource Exhaustion

<0:239-27.el8
  • M
CVE-2023-26604

<0:239-74.el8_8.2
  • M
CVE-2023-26604

<0:239-74.el8_8.2
  • M
CVE-2023-26604

<0:239-74.el8_8.2
  • M
CVE-2023-26604

<0:239-74.el8_8.2
  • M
CVE-2023-26604

<0:239-74.el8_8.2
  • M
Information Exposure

<0:239-68.el8_7.4
  • M
Information Exposure

<0:239-68.el8_7.4
  • M
Information Exposure

<0:239-68.el8_7.4
  • M
Information Exposure

<0:239-68.el8_7.4
  • M
Information Exposure

<0:239-68.el8_7.4
  • M
Off-by-one Error

<0:239-68.el8_7.1
  • M
Off-by-one Error

<0:239-68.el8_7.1
  • M
Off-by-one Error

<0:239-68.el8_7.1
  • M
Off-by-one Error

<0:239-68.el8_7.1
  • M
Off-by-one Error

<0:239-68.el8_7.1
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-31.el8_2.9
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-31.el8_2.9
  • H
Use After Free

<0:239-45.el8_4.12
  • H
Use After Free

<0:239-45.el8_4.12
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-31.el8_2.9
  • H
Use After Free

<0:239-45.el8_4.12
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-31.el8_2.9
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-45.el8_4.12
  • H
Use After Free

<0:239-18.el8_1.11
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-58.el8_6.4
  • H
Use After Free

<0:239-58.el8_6.4
  • L
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-31.el8_2.4
  • H
Resource Exhaustion

<0:239-31.el8_2.4
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-31.el8_2.4
  • H
Resource Exhaustion

<0:239-18.el8_1.8
  • H
Resource Exhaustion

<0:239-41.el8_3.3
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-18.el8_1.8
  • H
Resource Exhaustion

<0:239-31.el8_2.4
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Resource Exhaustion

<0:239-45.el8_4.2
  • H
Out-of-bounds Write

<0:239-41.el8_3.3
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • L
Resource Exhaustion

<0:239-40.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Privilege Chaining

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • M
Incorrect Privilege Assignment

<0:239-29.el8
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

*
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-13.el8_0.7
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • H
Use After Free

<0:239-18.el8_1.4
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Improper Authorization

<0:239-18.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-31.el8_2.7
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-31.el8_2.7
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-31.el8_2.7
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-45.el8
  • M
Expected Behavior Violation

<0:239-31.el8_2.7
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-31.el8_2.7
  • M
Incorrect Authorization

<0:239-31.el8_2.7
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-31.el8_2.7
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-31.el8_2.7
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Incorrect Authorization

<0:239-45.el8
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Improper Input Validation

<0:239-13.el8_0.3
  • M
Information Exposure

*