Versions Packages Information History CVEs Related Badges Report

Versions for systemd

311 package(s) known

Repository Package name Version Category Maintainer(s)
ALT Linux p9 systemd 243.8 Potentially vulnerable System/Configuration/Boot and Init shaba@altlinux.ru
ALT Sisyphus systemd 246 System/Configuration/Boot and Init shaba@altlinux.ru
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
AOSC systemd 245 Potentially vulnerable admin fallback-mnt-aosc@repology
Arch
core
systemd 245.7 - -
Arch
core
systemd-libs 245.7 - -
Arch
core
systemd-resolvconf 245.7 - -
Arch
core
systemd-sysvcompat 245.7 - -
Arch
multilib
lib32-systemd 245.7 - -
Arch Testing
testing
systemd 246 - -
Arch Testing
testing
systemd-libs 246 - -
Arch Testing
testing
systemd-resolvconf 246 - -
Arch Testing
testing
systemd-sysvcompat 246 - -
Arch Testing
multilib-testing
lib32-systemd 246 - -
AUR lib32-systemd-git 245.r1582.ga07e962549 - yurikoles@aur
AUR systemd-git 245.r1582.ga07e962549 - yurikoles@aur
AUR systemd-libs-git 245.r1582.ga07e962549 - yurikoles@aur
AUR systemd-resolvconf-git 245.r1582.ga07e962549 - yurikoles@aur
AUR systemd-sysvcompat-git 245.r1582.ga07e962549 - yurikoles@aur
AUR libsystemd-eudev-standalone 232 Potentially vulnerable - nyz93@aur
AUR libx32-systemd 228 Potentially vulnerable - fantix@aur
Astra Orel Stable
main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Astra Orel Current
main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
CentOS 7
os
systemd 219 Potentially vulnerable Unspecified -
CentOS 7
updates
systemd 219 Potentially vulnerable Unspecified -
CentOS 7
updates
systemd 219 Potentially vulnerable Unspecified -
CentOS 7
updates
systemd 219 Potentially vulnerable Unspecified -
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
Chakra
core
systemd 242.84 Potentially vulnerable - -
Chakra
core
systemd-libs 242.84 Potentially vulnerable - -
Chakra
core
systemd-resolvconf 242.84 Potentially vulnerable - -
Chakra
core
systemd-debug 235.38 Potentially vulnerable - -
Debian Oldstable
oldstable/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Stable
stable/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Stable Backports
main
systemd 245.7 misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Stable Backports
main
systemd 245.6 misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Testing
testing/main
systemd 245.7 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Testing
testing/main
systemd 244.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Testing
testing/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Unstable
main
systemd 246 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Unstable
main
systemd 244.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Unstable
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Deepin
main
systemd 238 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 1.0 (Jessie)
jessie/main
systemd 215 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org, stapelberg@debian.org
Devuan 2.0 (ASCII)
ascii/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
systemd 245.7 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan Unstable
unstable/main
systemd 246 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
distri systemd 245 Potentially vulnerable - -
DistroWatch.com systemd 246 - -
Exherbo
arbor
sys-apps/systemd scm sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-apps/systemd 245.7 sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-apps/systemd 244 Potentially vulnerable sys-apps fallback-mnt-exherbo@repology
Fedora 26
release
systemd 233 Potentially vulnerable Unspecified -
Fedora 26
updates
systemd 233 Potentially vulnerable Unspecified -
Fedora 27
release
systemd 234 Potentially vulnerable Unspecified -
Fedora 27
updates
systemd 234 Potentially vulnerable Unspecified -
Fedora 28
release
systemd 238 Potentially vulnerable Unspecified -
Fedora 28
updates
systemd 238 Potentially vulnerable Unspecified -
Fedora 29
release
systemd 239 Potentially vulnerable Unspecified -
Fedora 29
updates
systemd 239 Potentially vulnerable Unspecified -
Fedora 30
release
systemd 241 Potentially vulnerable Unspecified -
Fedora 30
updates
systemd 241 Potentially vulnerable Unspecified -
Fedora 31
updates
systemd 243.8 Potentially vulnerable Unspecified -
Fedora 31
release
systemd 243 Potentially vulnerable Unspecified -
Fedora 32
updates
systemd 245.7 Unspecified -
Fedora 32
release
systemd 245.4 Unspecified -
Fedora Rawhide systemd 246 Unspecified -
freshcode.club systemd 220 Potentially vulnerable - -
Funtoo 1.4
nokit
sys-apps/systemd 9999 sys-apps systemd@gentoo.org
Funtoo 1.4
nokit
sys-apps/systemd 242 Potentially vulnerable sys-apps systemd@gentoo.org
Funtoo 1.4
nokit
sys-apps/systemd 241 Potentially vulnerable sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 9999 sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 246 sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 245.5 sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 244.3 Potentially vulnerable sys-apps systemd@gentoo.org
Kali Linux Rolling
main
systemd 245.6 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
KaOS
core
systemd 244 Potentially vulnerable - demm@kaosx.us
KaOS Build
build
systemd 246 - demm@kaosx.us
KaOS Build
build
systemd 246 - demm@kaosx.us
LiGurOS 20.7
nokit
sys-apps/systemd 9999 sys-apps systemd@gentoo.org
LiGurOS 20.7
nokit
sys-apps/systemd 246_rc2 sys-apps systemd@gentoo.org
LiGurOS 20.7
nokit
sys-apps/systemd 245.5 sys-apps systemd@gentoo.org
LiGurOS 20.7
nokit
sys-apps/systemd 244.3 Potentially vulnerable sys-apps systemd@gentoo.org
LiGurOS 21.1
nokit
sys-apps/systemd 9999 sys-apps systemd@gentoo.org
LiGurOS 21.1
nokit
sys-apps/systemd 246 sys-apps systemd@gentoo.org
LiGurOS 21.1
nokit
sys-apps/systemd 245.5 sys-apps systemd@gentoo.org
LiGurOS 21.1
nokit
sys-apps/systemd 244.3 Potentially vulnerable sys-apps systemd@gentoo.org
Linux Mint 17.3
upstream
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Linuxbrew systemd 244 Potentially vulnerable - -
Mageia 6
core/release
systemd 230 Potentially vulnerable System/Boot and Init -
Mageia 6
core/updates
systemd 230 Potentially vulnerable System/Boot and Init -
Mageia 6
core/updates
systemd 230 Potentially vulnerable System/Boot and Init -
Mageia 6
core/updates
systemd 230 Potentially vulnerable System/Boot and Init -
Mageia 7
core/release
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia Cauldron
core/release
systemd 246 System/Boot and Init -
Manjaro Stable
core
systemd 245.6 - -
Manjaro Stable
core
systemd-libs 245.6 - -
Manjaro Stable
core
systemd-resolvconf 245.6 - -
Manjaro Stable
core
systemd-sysvcompat 245.6 - -
Manjaro Testing
core
systemd 245.7 - -
Manjaro Testing
core
systemd-libs 245.7 - -
Manjaro Testing
core
systemd-resolvconf 245.7 - -
Manjaro Testing
core
systemd-sysvcompat 245.7 - -
Manjaro Unstable
core
systemd 246 - -
Manjaro Unstable
core
systemd-libs 246 - -
Manjaro Unstable
core
systemd-resolvconf 246 - -
Manjaro Unstable
core
systemd-sysvcompat 246 - -
MX Linux MX-19
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
MX Linux MX-19 Testing
test
systemd 245.6 admin mmikeinsantarosa@mxlinux.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
nixpkgs stable systemd 243.7 Potentially vulnerable - andreas@rammhold.de, edolstra+nixpkgs@gmail.com, flokli@flokli.de, joerg@thalheim.io
nixpkgs unstable systemd 245.6 - andreas@rammhold.de, edolstra+nixpkgs@gmail.com, flokli@flokli.de
openEuler 20.03
source
systemd 243 Potentially vulnerable Unspecified -
OpenMandriva 3.0
main/updates
systemd 238 Potentially vulnerable System/Configuration/Boot and Init nobodydead@gmail.com
OpenMandriva 3.0
main/release
systemd 229 Potentially vulnerable System/Configuration/Boot and Init tpgxyz@gmail.com
OpenMandriva 4.0
main/release
systemd 242.20190509 Potentially vulnerable System/Configuration/Boot and Init bero@lindev.ch
OpenMandriva 4.0
main/release
systemd 242.20190509 Potentially vulnerable System/Configuration/Boot and Init bero@lindev.ch
OpenMandriva 4.1
main/release
systemd 244.20191203 Potentially vulnerable System/Configuration/Boot and Init nobodydead@gmail.com
OpenMandriva Rolling
main/release
systemd 245.20200628 System/Configuration/Boot and Init bero@lindev.ch
OpenMandriva Cooker
main/release
systemd 245.20200628 System/Configuration/Boot and Init bero@lindev.ch
openSUSE Leap 42.3
main/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
main/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Tumbleweed systemd 245.6 System/Base -
openSUSE Tumbleweed systemd-mini 245.6 System/Base -
Parabola
libre
systemd 245.7 - -
Parabola
libre
systemd-common 245.7 - -
Parabola
libre
systemd-libs 245.7 - -
Parabola
libre
systemd-libsystemd 245.7 - -
Parabola
libre
systemd-libudev 245.7 - -
Parabola
libre
systemd-nss-myhostname 245.7 - -
Parabola
libre
systemd-nss-mymachines 245.7 - -
Parabola
libre
systemd-nss-resolve 245.7 - -
Parabola
libre
systemd-nss-systemd 245.7 - -
Parabola
libre
systemd-udev 245.7 - -
Parabola
libre
systemd-resolvconf 245.7 - -
Parabola
libre
systemd-sysvcompat 245.7 - -
Pardus
main
systemd 241 Potentially vulnerable misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Parrot
main
systemd 245.6 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
PLD Linux systemd 245.6 - -
PureOS Amber systemd 241 Potentially vulnerable misc pureos-project@lists.puri.sm, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
PureOS landing systemd 242 Potentially vulnerable misc pureos-project@lists.puri.sm, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
PureOS landing systemd 242 Potentially vulnerable misc pureos-project@lists.puri.sm, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Oldstable
main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Stable
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Testing
main
systemd 245.6 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Rosa 2014.1
main/updates
systemd 219 Potentially vulnerable - -
Rosa 2014.1
main/release
systemd 208 Potentially vulnerable - -
Rosa 2016.1
main/testing
systemd 243 Potentially vulnerable - -
Rosa 2016.1
main/updates
systemd 243 Potentially vulnerable - -
Rosa 2016.1
main/release
systemd 230 Potentially vulnerable - -
Rosa 2019.1
main/release
systemd 243 Potentially vulnerable System/Configuration/Boot and Init m.novosyolov@rosalinux.ru
Rosa Server 7.3
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Sabayon sys-apps/systemd 242 Potentially vulnerable sys-apps systemd@gentoo.org
Sabayon sys-apps/systemd 242 Potentially vulnerable sys-apps systemd@gentoo.org
Sabayon sys-apps/systemd 239 Potentially vulnerable sys-apps systemd@gentoo.org
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 207 Potentially vulnerable Unspecified -
Siduction Experimental
extra main
systemd 242 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Siduction Experimental
fixes main
systemd 242 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
SliTaz Cooking systemd 195 Potentially vulnerable base-system pankso@slitaz.org
Solus systemd 245.6 system.base joshua@streambits.io
Solus systemd-32bit 245.6 emul32 joshua@streambits.io
Solus systemd-32bit-dbginfo 245.6 debug joshua@streambits.io
Solus systemd-32bit-devel 245.6 programming.devel joshua@streambits.io
Solus systemd-dbginfo 245.6 debug joshua@streambits.io
Solus systemd-devel 245.6 system.devel joshua@streambits.io
Trisquel 7.0
belenos/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Trisquel 7.0
belenos-updates/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Trisquel 8.0
flidas/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Trisquel 8.0
flidas-updates/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 14.04
trusty/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Ubuntu 14.04
trusty-updates/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Ubuntu 16.04
xenial/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 16.04
xenial-updates/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 18.04
bionic/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 18.04
bionic-updates/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 19.10
eoan/main
systemd 242 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 19.10
eoan-updates/main
systemd 242 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.04
focal/main
systemd 245.4 admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.04
focal-updates/main
systemd 245.4 admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.10
groovy/main
systemd 245.7 admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Wikidata systemd 246 - -

Absent in repositories

  • Adélie Linux current
  • AIX Open Source Packages
  • Alpine Linux 3.8
  • Alpine Linux 3.9
  • Alpine Linux 3.10
  • Alpine Linux 3.11
  • Alpine Linux 3.12
  • Alpine Linux Edge
  • Amazon Linux 1
  • antiX-16
  • antiX-17
  • antiX-19
  • AppGet
  • Ataraxia Linux
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • CentOS 6
  • Chakra Staging
  • Chakra Testing
  • Chocolatey
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • CRUX 3.4
  • CRUX 3.5
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Experimental
  • DPorts
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • FreeBSD Ports
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • GNU Guix
  • GoboLinux
  • Hackage
  • HaikuPorts master
  • Homebrew
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • Hyperbola
  • IBM i
  • just-install
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Games
  • KISS Linux Main
  • Kwort 4.3.2
  • Kwort 4.3.3
  • Kwort 4.3.4
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • MacPorts
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • OpenBSD Ports
  • OpenIndiana packages
  • OpenPKG
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OpenWrt 17.01 x86_64
  • OpenWrt 18.06 x86_64
  • OpenWrt 19.07 x86_64
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • PCLinuxOS
  • Pisi Linux
  • Pisi Linux Contrib
  • pkgsrc current
  • Ravenports
  • ReactOS rapps
  • RebornOS
  • Rosa Server 6.9
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon for-gentoo
  • Salix 14.2
  • Scoop
  • Siduction
  • SlackBuilds
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • SliTaz Next
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • T2 SDE
  • Tails stable
  • Tails devel
  • Termux
  • Trisquel 6.0
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • Void Linux x86_64
  • Whonix
  • Whonix Developers
  • winget
  • YACP