Search for packages
| purl | pkg:rpm/redhat/systemd-main@260.1-2.1?arch=hum1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4eyp-2xve-qugd
Aliases: CVE-2026-40226 |
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file. | There are no reported fixed by versions. |
|
VCID-fp54-ff23-vbb5
Aliases: CVE-2026-29111 |
systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data | There are no reported fixed by versions. |
|
VCID-fq31-vafy-a3ex
Aliases: CVE-2026-40228 |
In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a "logger -p emerg" command is executed, if ForwardToWall=yes is set. | There are no reported fixed by versions. |
|
VCID-hwg6-vaus-cfa2
Aliases: CVE-2026-40225 |
In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output. | There are no reported fixed by versions. |
|
VCID-m2qr-wk7f-8uda
Aliases: CVE-2026-40223 |
There are no reported fixed by versions. | |
|
VCID-sejj-hs68-n3gs
Aliases: CVE-2026-40224 |
There are no reported fixed by versions. | |
|
VCID-v7z5-xs49-r3ar
Aliases: CVE-2026-40227 |
systemd: systemd: Denial of Service via malicious IPC API call with null element | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||