systemd/systemd vulnerabilities

Licenses: GPL-2.0 | MIT

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|systemd/systemd package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Insufficient Granularity of Access Control

[225,226)[259-rc1,259.4)[260-rc1,260-rc3)
  • M
Signal Handler Race Condition

[253-rc1,257.6)
  • M
Insufficient Verification of Data Authenticity

[,248.13)[249,249.17)[250,250.14)[251,251.20)[252,252.21)[253,253.15)[254,254.8)[255,255.2)
  • C
Arbitrary Code Execution

[,247)
  • M
Information Exposure

[0,253-rc1)
  • M
Denial of Service (DoS)

[,252-rc3)
  • M
Off-by-one Error

[,252)
  • M
Uncontrolled Recursion

[,251-rc1)
  • H
Use After Free

[,240)
  • H
Improper Input Validation

[223,236)
  • H
Denial of Service (DoS)

[,241)
  • M
Access Restriction Bypass

[,237)
  • H
Use After Free

[,245)
  • M
Insecure Default

[,194)
  • M
Access Restriction Bypass

[,208)
  • M
Improper Input Validation

[209,232)
  • H
Improper Input Validation

[,234)
  • M
Denial of Service (DoS)

[,246.15)[247,247.8)[248,248.5)[249,249.1)
  • H
Access Restriction Bypass

[0,229)
  • H
Denial of Service (DoS)

[,241)
  • H
Deserialization of Untrusted Data

[,240)
  • H
Insecure Permissions

[,242)
  • H
Privilege Chaining

[,242)
  • C
Out-of-Bounds

[,240)
  • M
Access Restriction Bypass

[0,243)
  • C
Information Exposure

[0,243-rc1)
  • L
Memory Leak

[,243)
  • M
Race Condition

[,234)
  • M
Symlink Attack

[,239)
  • M
Improper Input Validation

[,246)
  • M
User Impersonation

[0,249)
  • M
Out-of-Bounds

[,242-rc1)
  • M
Denial of Service (DoS)

[,38)
  • M
Denial of Service (DoS)

[,194)
  • M
Race Condition

[,240)
  • C
Improper Input Validation

[,234)
  • H
Arbitrary Code Execution

[,238)
  • H
Improper Authorization

[,242)
  • C
Out-of-Bounds

[,229)
  • H
Out-of-bounds Write

[,234)
  • H
Symlink Attack

[,237)
  • H
Integer Overflow or Wraparound

[,190)
  • L
Out-of-bounds Read

[221,240)