Debian Package Tracker
Register | Log in
Subscribe

systemd

system and service manager

Choose email to subscribe with

general
  • source: systemd (main)
  • version: 260.1-1
  • maintainer: Debian systemd Maintainers (archive) (DMD)
  • uploaders: Martin Pitt [DMD] – Sjoerd Simons [DMD] – Marco d'Itri [DMD] – Felipe Sateler [DMD] – Luca Boccassi [DMD] – Nick Rosbrook [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 247.3-7+deb11u5
  • o-o-sec: 247.3-7+deb11u7
  • o-o-upd: 247.3-7+deb11u4
  • oldstable: 252.39-1~deb12u1
  • old-sec: 252.38-1~deb12u1
  • old-bpo: 254.26-1~bpo12+1
  • stable: 257.9-1~deb13u1
  • stable-upd: 257.8-1~deb13u2
  • testing: 260-1
  • unstable: 260.1-1
versioned links
  • 247.3-7+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 247.3-7+deb11u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 247.3-7+deb11u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 252.38-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 252.39-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 254.26-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 257.8-1~deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 257.9-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 260-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 260.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libnss-myhostname (1 bugs: 0, 0, 1, 0)
  • libnss-mymachines
  • libnss-resolve (1 bugs: 0, 1, 0, 0)
  • libnss-systemd (1 bugs: 0, 1, 0, 0)
  • libpam-systemd
  • libsystemd-dev
  • libsystemd-shared
  • libsystemd0
  • libudev-dev
  • libudev1
  • systemd (49 bugs: 0, 37, 12, 0)
  • systemd-boot (12 bugs: 0, 11, 1, 0)
  • systemd-boot-efi
  • systemd-boot-efi-amd64-signed-template
  • systemd-boot-efi-arm64-signed-template
  • systemd-boot-tools
  • systemd-container (1 bugs: 0, 0, 1, 0)
  • systemd-coredump
  • systemd-cryptsetup
  • systemd-dev
  • systemd-homed (4 bugs: 2, 2, 0, 0)
  • systemd-journal-remote
  • systemd-oomd (1 bugs: 0, 1, 0, 0)
  • systemd-repart (1 bugs: 0, 0, 1, 0)
  • systemd-resolved (8 bugs: 0, 5, 3, 0)
  • systemd-standalone-shutdown
  • systemd-standalone-sysusers
  • systemd-standalone-tmpfiles
  • systemd-sysv (1 bugs: 0, 1, 0, 0)
  • systemd-tests
  • systemd-timesyncd (1 bugs: 0, 1, 0, 0)
  • systemd-ukify (1 bugs: 0, 1, 0, 0)
  • systemd-userdbd
  • udev (10 bugs: 0, 9, 1, 0)
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

1 important issue:
  • CVE-2026-29111: systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
1 issue left for the package maintainer to handle:
  • CVE-2026-4105: (needs triaging) A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-03-13 Last update: 2026-03-24 12:17
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2026-29111: systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
1 issue left for the package maintainer to handle:
  • CVE-2026-4105: (needs triaging) A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-03-13 Last update: 2026-03-24 12:17
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2026-29111: systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
1 issue postponed or untriaged:
  • CVE-2026-4105: (postponed; to be fixed through a stable update) A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.
Created: 2026-03-24 Last update: 2026-03-24 12:17
5 bugs tagged help in the BTS normal
The BTS contains 5 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2019-03-21 Last update: 2026-03-24 19:00
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2025-05-31 Last update: 2026-03-24 19:00
Depends on packages which need a new maintainer normal
The packages that systemd depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2026-03-24 17:02
6 open merge requests in Salsa normal
There are 6 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-03-16 14:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-03-23 23:30
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migrates after: systemd-boot-efi-amd64-signed, systemd-boot-efi-arm64-signed
    • Migration status for systemd (260-1 to 260.1-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for apache2/2.4.66-8: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for ayatana-indicator-session: amd64: Test triggered (failure will be ignored), arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for bilibop/0.6.5: amd64: Pass, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for ceph/18.2.7+ds-1.1: amd64: Pass, arm64: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for comitup/1.43-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for debci/3.14.1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for debusine/0.14.5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for debvm/0.5.2: amd64: Pass, arm64: Pass, i386: No tests, superficial or marked flaky ♻, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for dgit: riscv64: Test triggered
    • ∙ ∙ Autopkgtest for dracut: riscv64: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for dracut/110-7: amd64: Pass, arm64: Pass, i386: No tests, superficial or marked flaky ♻, ppc64el: Regression ♻ (reference ♻), s390x: Pass
    • ∙ ∙ Autopkgtest for gdm3/49.2-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Regression ♻ (reference ♻), s390x: Pass
    • ∙ ∙ Autopkgtest for golang-github-coreos-go-systemd/22.6.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for incus/6.0.5-8: i386: Pass ♻ (reference ♻), ppc64el: Pass ♻ (reference ♻), s390x: Pass ♻
    • ∙ ∙ Autopkgtest for libcamera/0.7.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for mariadb/1:11.8.6-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for munin/2.0.76-6: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Regression ♻ (reference ♻), s390x: Pass
    • ∙ ∙ Autopkgtest for netplan.io/1.1.2-8: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for openvpn/2.7.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for rust-virtiofsd/1.13.2-6: amd64: Pass, arm64: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for shibboleth-sp/3.5.2+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for smcroute/2.5.7-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for squid/7.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for sssd/2.12.0-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for suricata/1:8.0.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for systemd/260.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for systemd-bootchart/235-2: amd64: Pass, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for tpm2-abrmd/3.0.0-1.2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for tpm2-tss/4.1.3-6: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for umockdev/0.19.6-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for unbound/1.24.2-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for usbauth/1.0.5-1.1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for wireshark/4.6.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Autopkgtest for wlroots/0.19.2-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for zfs-linux/2.4.1-1: amd64: Pass, arm64: Pass, i386: No tests, superficial or marked flaky ♻, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Lintian check waiting for test results - info
    • ∙ ∙ Too young, only 0 of 5 days old
    • ∙ ∙ Implicit dependency: systemd systemd-boot-efi-amd64-signed
    • ∙ ∙ Implicit dependency: systemd systemd-boot-efi-arm64-signed
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/s/systemd.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproducibility check waiting for results on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-03-23] Accepted systemd 260.1-1 (source) into unstable (Luca Boccassi)
  • [2026-03-20] systemd 260-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-18] systemd 260~rc4-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-17] Accepted systemd 260-1 (source) into unstable (Luca Boccassi)
  • [2026-03-14] Accepted systemd 260~rc4-1 (source) into unstable (Luca Boccassi)
  • [2026-03-12] Accepted systemd 260~rc3-1 (source) into unstable (Luca Boccassi)
  • [2026-03-09] systemd 260~rc2-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-04] Accepted systemd 260~rc2-1 (source) into unstable (Luca Boccassi)
  • [2026-02-25] Accepted systemd 260~rc1-2 (source) into unstable (Luca Boccassi)
  • [2026-02-25] Accepted systemd 260~rc1-1 (source) into unstable (Luca Boccassi)
  • [2026-02-10] systemd 259.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-06] Accepted systemd 259.1-1 (source) into unstable (Luca Boccassi)
  • [2025-12-23] systemd 259-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-18] Accepted systemd 259-1 (source) into unstable (Luca Boccassi)
  • [2025-12-13] systemd 259~rc3-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-10] Accepted systemd 259~rc3-1 (source) into unstable (Luca Boccassi)
  • [2025-12-02] systemd 259~rc2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-26] Accepted systemd 259~rc2-1 (source) into unstable (Luca Boccassi)
  • [2025-11-21] systemd 259~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-17] Accepted systemd 259~rc1-1 (source) into unstable (Luca Boccassi)
  • [2025-10-30] systemd 258.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-10-27] Accepted systemd 258.1-2 (source) into unstable (Luca Boccassi)
  • [2025-10-19] Accepted systemd 257.9-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Luca Boccassi)
  • [2025-10-16] systemd 258.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-13] Accepted systemd 258.1-1 (source) into unstable (Luca Boccassi)
  • [2025-09-20] systemd 258-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-17] Accepted systemd 258-1 (source) into unstable (Luca Boccassi)
  • [2025-09-11] systemd 258~rc4-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-09] Accepted systemd 257.8-1~deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Philipp Kern)
  • [2025-09-05] Accepted systemd 258~rc4-1 (source) into unstable (Luca Boccassi)
  • 1
  • 2
bugs [bug history graph]
  • all: 89 96
  • RC: 1 2
  • I&N: 67 72
  • M&W: 20 21
  • F&P: 1
  • patch: 2
  • help: 5
links
  • homepage
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 77)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 259.5-0ubuntu1
  • 78 bugs (3 patches)
  • patches for 259.5-0ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing