Search for packages
| purl | pkg:deb/debian/systemd@260.1-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4eyp-2xve-qugd | In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file. |
CVE-2026-40226
|
| VCID-4n47-ffax-sbdu | systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method |
CVE-2026-4105
|
| VCID-fp54-ff23-vbb5 | systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data |
CVE-2026-29111
|
| VCID-hwg6-vaus-cfa2 | In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output. |
CVE-2026-40225
|