Multiple vulnerabilities have been discovered in systemd, the worst of which could result in denial of service.
Package | sys-apps/systemd on all architectures |
---|---|
Affected versions | < 251.3 |
Unaffected versions | >= 251.3 |
Package | sys-apps/systemd-tmpfiles on all architectures |
---|---|
Affected versions | <= 250 |
Unaffected versions |
Package | sys-apps/systemd-utils on all architectures |
---|---|
Affected versions | < 251.3 |
Unaffected versions | >= 251.3 |
Package | sys-fs/udev on all architectures |
---|---|
Affected versions | <= 250 |
Unaffected versions |
A system and service manager.
Multiple vulnerabilities have been discovered in systemd. Please review the CVE identifiers referenced below for details.
Please review the referenced CVE identifiers for details.
There is no known workaround at this time.
All systemd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/systemd-251.3"
All systemd-utils users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/systemd-utils-251.3"
Gentoo has discontinued support for sys-apps/systemd-tmpfiles, sys-boot/systemd-boot, and sys-fs/udev. See the 2022-04-19-systemd-utils news item. Users should unmerge it in favor of sys-apps/systemd-utils on non-systemd systems:
# emerge --ask --depclean --verbose "sys-apps/systemd-tmpfiles" "sys-boot/systemd-boot" "sys-fs/udev" # emerge --ask --verbose --oneshot ">=sys-apps/systemd-utils-251.3"