Versions Packages Information History CVEs Related Badges Report

Versions for systemd

365 package(s) known

Repository Package name Version Category Maintainer(s)
AlmaLinux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified packager@almalinux.org
ALT Linux p9 systemd 246.16 System/Configuration/Boot and Init shaba@altlinux.ru
ALT Linux p10 systemd 249.4 System/Configuration/Boot and Init shaba@altlinux.org
ALT Sisyphus systemd 249.4 System/Configuration/Boot and Init shaba@altlinux.org
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
Amazon Linux 2 systemd 219 Potentially vulnerable Unspecified -
AOSC systemd 248.3 Potentially vulnerable admin fallback-mnt-aosc@repology
Apertis v2020
v2020/target
systemd 241 Potentially vulnerable main pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Apertis v2021
v2021/target
systemd 241 Potentially vulnerable main pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Apertis v2022 Development
v2022dev2/target
systemd 247.3 Potentially vulnerable main pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Arch
multilib
lib32-systemd 249.4 - -
Arch
core
systemd-sysvcompat 249.4 - -
Arch
core
systemd 249.4 - -
Arch
core
systemd-libs 249.4 - -
Arch
core
systemd-resolvconf 249.4 - -
AUR systemd-git 249.r224.ge3709627e6 - yurikoles@aur
AUR systemd-libs-git 249.r224.ge3709627e6 - yurikoles@aur
AUR systemd-resolvconf-git 249.r224.ge3709627e6 - yurikoles@aur
AUR systemd-sysvcompat-git 249.r224.ge3709627e6 - yurikoles@aur
AUR lib32-systemd-git 249.r108.g6c39b39aa8 - yurikoles@aur
AUR libx32-systemd 228 Potentially vulnerable - fantix@aur
Astra Orel Stable
main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Astra Orel Current
main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ataraxia GNU/Linux systemd 248.3 Potentially vulnerable base nagakamira@gmail.com
CentOS 7
os
systemd 219 Potentially vulnerable Unspecified -
CentOS 7
updates
systemd 219 Potentially vulnerable Unspecified -
CentOS 7
updates
systemd 219 Potentially vulnerable Unspecified -
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
systemd 239 Potentially vulnerable Unspecified bugs@centos.org
Chakra
core
systemd 242.84 Potentially vulnerable - -
Chakra
core
systemd-libs 242.84 Potentially vulnerable - -
Chakra
core
systemd-resolvconf 242.84 Potentially vulnerable - -
Chakra
core
systemd-debug 235.38 Potentially vulnerable - -
ConanCenter libsystemd 249.4 - -
ConanCenter libsystemd 248.3 Potentially vulnerable - -
ConanCenter libsystemd 247.3 Potentially vulnerable - -
ConanCenter libsystemd 247.2 Potentially vulnerable - -
ConanCenter libsystemd 246.6 Potentially vulnerable - -
Debian 8
jessie/main
systemd 215 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org, stapelberg@debian.org
Debian 9
stretch/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 9 Backports
stretch-backports/main
systemd 241 Potentially vulnerable misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 10
buster/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 10 Backports
buster-backports/main
systemd 247.3 Potentially vulnerable misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 11
bullseye/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 12
bookworm/main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian 12
bookworm/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Stable
stable/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Testing
testing/main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Testing
testing/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Unstable
sid/main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Unstable
sid/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Debian Experimental
experimental/main
systemd 249.4 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Deepin
main
systemd 241.26 Potentially vulnerable - pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 1.0 (Jessie)
jessie/main
systemd 215 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org, stapelberg@debian.org
Devuan 2.0 (ASCII)
ascii/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Devuan Unstable
unstable/main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
distri systemd 245 Potentially vulnerable - -
DistroWatch.com systemd 249.4 - -
Exherbo
arbor
sys-apps/systemd scm sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-apps/systemd 249.4 sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-apps/systemd 248.5 sys-apps fallback-mnt-exherbo@repology
Fedora 26
release
systemd 233 Potentially vulnerable Unspecified -
Fedora 26
updates
systemd 233 Potentially vulnerable Unspecified -
Fedora 27
release
systemd 234 Potentially vulnerable Unspecified -
Fedora 27
updates
systemd 234 Potentially vulnerable Unspecified -
Fedora 28
updates
systemd 238 Potentially vulnerable Unspecified -
Fedora 28
release
systemd 238 Potentially vulnerable Unspecified -
Fedora 29
release
systemd 239 Potentially vulnerable Unspecified -
Fedora 29
updates
systemd 239 Potentially vulnerable Unspecified -
Fedora 30
release
systemd 241 Potentially vulnerable Unspecified -
Fedora 30
updates
systemd 241 Potentially vulnerable Unspecified -
Fedora 31
updates
systemd 243.9 Potentially vulnerable Unspecified -
Fedora 31
release
systemd 243 Potentially vulnerable Unspecified -
Fedora 32
updates
systemd 245.9 Potentially vulnerable Unspecified -
Fedora 32
release
systemd 245.4 Potentially vulnerable Unspecified -
Fedora 33
updates
systemd 246.15 Unspecified -
Fedora 33
release
systemd 246.6 Potentially vulnerable Unspecified -
Fedora 34
updates
systemd 248.7 Unspecified -
Fedora 34
release
systemd 248 Potentially vulnerable Unspecified -
Fedora Rawhide systemd 249.4 Unspecified -
Funtoo 1.4
nokit
sys-apps/systemd 9999 sys-apps systemd@gentoo.org
Funtoo 1.4
nokit
sys-apps/systemd 242 Potentially vulnerable sys-apps systemd@gentoo.org
Funtoo 1.4
nokit
sys-apps/systemd 241 Potentially vulnerable sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 9999 sys-apps systemd@gentoo.org
Gentoo sys-apps/systemd 249.4 sys-apps systemd@gentoo.org
GoboLinux Systemd 247 Potentially vulnerable - -
Homebrew systemd 246 Potentially vulnerable - -
Kali Linux Rolling
main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
KaOS
core
systemd 249.4 - demm@kaosx.us
LiGurOS stable sys-apps/systemd 9999 sys-apps systemd@gentoo.org
LiGurOS stable sys-apps/systemd 249.2 sys-apps systemd@gentoo.org
LiGurOS stable sys-apps/systemd 248.6 sys-apps systemd@gentoo.org
LiGurOS develop sys-apps/systemd 9999 sys-apps systemd@gentoo.org
LiGurOS develop sys-apps/systemd 249.4 sys-apps systemd@gentoo.org
Linux Mint 17.3
upstream
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Linuxbrew systemd 246 Potentially vulnerable - -
Mageia 7
core/release
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 7
core/updates
systemd 241 Potentially vulnerable System/Boot and Init -
Mageia 8
core/updates
systemd 246.15 System/Boot and Init -
Mageia 8
core/updates
systemd 246.13 Potentially vulnerable System/Boot and Init -
Mageia 8
core/updates
systemd 246.13 Potentially vulnerable System/Boot and Init -
Mageia 8
core/updates
systemd 246.11 Potentially vulnerable System/Boot and Init -
Mageia 8
core/updates
systemd 246.10 Potentially vulnerable System/Boot and Init -
Mageia 8
core/release
systemd 246.9 Potentially vulnerable System/Boot and Init -
Mageia Cauldron
core/release
systemd 249.4 System/Boot and Init -
Manjaro Stable
core
systemd-sysvcompat 249.4 - -
Manjaro Stable
core
systemd-libs 249.4 - -
Manjaro Stable
core
systemd 249.4 - -
Manjaro Stable
core
systemd-resolvconf 249.4 - -
Manjaro Testing
core
systemd-libs 249.4 - -
Manjaro Testing
core
systemd-resolvconf 249.4 - -
Manjaro Testing
core
systemd 249.4 - -
Manjaro Testing
core
systemd-sysvcompat 249.4 - -
Manjaro Unstable
core
systemd 249.4 - -
Manjaro Unstable
core
systemd-libs 249.4 - -
Manjaro Unstable
core
systemd-sysvcompat 249.4 - -
Manjaro Unstable
core
systemd-resolvconf 249.4 - -
MX Linux MX-19
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
nixpkgs stable 21.05 systemd 247.6 Potentially vulnerable - andreas@rammhold.de, edolstra+nixpkgs@gmail.com, flokli@flokli.de, me@kloenk.de
nixpkgs unstable systemd 249.4 - andreas@rammhold.de, edolstra+nixpkgs@gmail.com, flokli@flokli.de, me@kloenk.de
openEuler 20.03
source
systemd 243 Potentially vulnerable Unspecified -
openmamba
devel
systemd 249 Potentially vulnerable System/Configuration silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
systemd 242.20190509 Potentially vulnerable System/Configuration/Boot and Init bero@lindev.ch
OpenMandriva 4.0
main/release
systemd 242.20190509 Potentially vulnerable System/Configuration/Boot and Init bero@lindev.ch
OpenMandriva Cooker
main/release
systemd 249.20210911 System/Configuration/Boot and Init tpgxyz@gmail.com
openSUSE Leap 42.3
main/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
main/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
systemd-mini 228 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
systemd-mini 234 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
systemd 246.13 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
systemd-mini 246.13 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
systemd 249.4 Unspecified -
openSUSE Tumbleweed
src-oss
systemd-mini 249.4 Unspecified -
Parabola
libre
systemd-libudev 249.4 - -
Parabola
libre
systemd-nss-resolve 249.4 - -
Parabola
libre
systemd-nss-mymachines 249.4 - -
Parabola
libre
systemd-libs 249.4 - -
Parabola
libre
systemd 249.4 - -
Parabola
libre
systemd-debug 249.4 - -
Parabola
libre
systemd-libsystemd 249.4 - -
Parabola
libre
systemd-nss-systemd 249.4 - -
Parabola
libre
systemd-sysvcompat 249.4 - -
Parabola
libre
systemd-udev 249.4 - -
Parabola
libre
systemd-nss-myhostname 249.4 - -
Parabola
libre
systemd-resolvconf 249.4 - -
Parabola
libre
systemd-common 249.4 - -
Pardus 17
main
systemd 241 Potentially vulnerable misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 17
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 17
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 17
updates/main
systemd 232 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 19
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 19
updates/main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Pardus 21
main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Parrot
main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
PLD Linux systemd 246.15 - -
PureOS Amber systemd 241 Potentially vulnerable misc pureos-project@lists.puri.sm, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
PureOS landing systemd 247.3 Potentially vulnerable misc pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Oldstable
main
systemd 241 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Stable
main
systemd 247.3 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Raspbian Testing
main
systemd 247.9 admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Rocky Linux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rocky Linux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rocky Linux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rocky Linux 8
BaseOS
systemd 239 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rosa 2014.1
main/updates
systemd 219 Potentially vulnerable - -
Rosa 2014.1
main/release
systemd 208 Potentially vulnerable - -
Rosa 2016.1
main/testing
systemd 243 Potentially vulnerable - -
Rosa 2016.1
main/testing
systemd 243 Potentially vulnerable - -
Rosa 2016.1
main/updates
systemd 243 Potentially vulnerable - -
Rosa 2016.1
main/release
systemd 230 Potentially vulnerable - -
Rosa 2019.1
main/release
systemd 246.13 Potentially vulnerable System/Configuration/Boot and Init m.novosyolov@rosalinux.ru
Rosa Server 7.3
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
systemd 219 Potentially vulnerable Unspecified alex2048@mail.ru
Sabayon sys-apps/systemd 247.2 Potentially vulnerable sys-apps systemd@gentoo.org
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 219 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 208 Potentially vulnerable Unspecified -
Scientific Linux 7.x systemd 207 Potentially vulnerable Unspecified -
Siduction Experimental
extra main
systemd 242 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Siduction Experimental
fixes main
systemd 242 Potentially vulnerable admin pkg-systemd-maintainers@lists.alioth.debian.org, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
SliTaz Cooking systemd 195 Potentially vulnerable base-system pankso@slitaz.org
Solus systemd 247.8 system.base joshua@streambits.io
Solus systemd-32bit 247.8 emul32 joshua@streambits.io
Solus systemd-32bit-dbginfo 247.8 debug joshua@streambits.io
Solus systemd-32bit-devel 247.8 programming.devel joshua@streambits.io
Solus systemd-dbginfo 247.8 debug joshua@streambits.io
Solus systemd-devel 247.8 system.devel joshua@streambits.io
Trisquel 7.0
belenos/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Trisquel 7.0
belenos-updates/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Trisquel 8.0
flidas/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Trisquel 8.0
flidas-updates/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Trisquel 9.0
etiona/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Trisquel 9.0
etiona-updates/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
UBI 8
baseos
systemd 239 Potentially vulnerable Unspecified -
Ubuntu 14.04
trusty/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Ubuntu 14.04
trusty-updates/main
systemd 204 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, tfheen@debian.org
Ubuntu 16.04
xenial/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 16.04
xenial-updates/main
systemd 229 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 18.04
bionic-updates/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 18.04
bionic/main
systemd 237 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.04
focal-updates/main
systemd 245.4 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.04
focal/main
systemd 245.4 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.10
groovy/main
systemd 246.6 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 20.10
groovy-updates/main
systemd 246.6 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 21.04
hirsute-updates/main
systemd 247.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 21.04
hirsute/main
systemd 247.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Ubuntu 21.10
impish/main
systemd 248.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, fsateler@debian.org, md@linux.it, mpitt@debian.org, sjoerd@debian.org
Wikidata systemd 249 Potentially vulnerable - -