Hello community,

here is the log from the commit of package sssd for openSUSE:Factory checked in 
at 2013-05-13 15:39:41
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sssd (Old)
 and      /work/SRC/openSUSE:Factory/.sssd.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sssd"

Changes:
--------
--- /work/SRC/openSUSE:Factory/sssd/sssd.changes        2013-04-16 
06:58:46.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.sssd.new/sssd.changes   2013-05-13 
15:39:42.000000000 +0200
@@ -1,0 +2,24 @@
+Thu May  2 09:20:49 UTC 2013 - [email protected]
+
+- Update to new upstream release 1.9.5
+* Includes a fix for CVE-2013-0287: A simple access provider flaw
+  prevents intended ACL use when SSSD is configured as an Active
+  Directory client.
+* Fixed spurious password expiration warning that was printed on
+  login with the Kerberos back end.
+* A new option ldap_rfc2307_fallback_to_local_users was added. If
+  this option is set to true, SSSD is be able to resolve local
+  group members of LDAP groups.
+* Fixed an indexing bug that prevented the contents of autofs maps
+  from being returned to the automounter deamon in case the map
+  contained a large number of entries.
+* Several fixes for safer handling of Kerberos credential caches
+  for cases where the ccache is set to be stored in a DIR: type.
+- Remove Provide-a-be_get_account_info_send-function.patch,
+  Add-unit-tests-for-simple-access-test-by-groups.patch,
+  Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch,
+  Resolve-GIDs-in-the-simple-access-provider.patch
+  (CVE-2013-0287 material is in upstream),
+  sssd-sysdb-binary-attrs.diff (merged upstream)
+
+-------------------------------------------------------------------

Old:
----
  Add-unit-tests-for-simple-access-test-by-groups.patch
  Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch
  Provide-a-be_get_account_info_send-function.patch
  Resolve-GIDs-in-the-simple-access-provider.patch
  sssd-1.9.4.tar.gz
  sssd-1.9.4.tar.gz.asc
  sssd-sysdb-binary-attrs.diff

New:
----
  sssd-1.9.5.tar.gz
  sssd-1.9.5.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sssd.spec ++++++
--- /var/tmp/diff_new_pack.fcWSs1/_old  2013-05-13 15:39:44.000000000 +0200
+++ /var/tmp/diff_new_pack.fcWSs1/_new  2013-05-13 15:39:44.000000000 +0200
@@ -17,13 +17,12 @@
 
 
 Name:           sssd
-Version:        1.9.4
+Version:        1.9.5
 Release:        0
 Summary:        System Security Services Daemon
 License:        GPL-3.0+ and LGPL-3.0+
 Group:          System/Daemons
 Url:            https://fedorahosted.org/sssd/
-Requires(postun): pam-config
 
 #Git-Clone:    git://git.fedorahosted.org/sssd
 Source:         https://fedorahosted.org/released/sssd/sssd-%version.tar.gz
@@ -32,13 +31,6 @@
 Patch1:         0005-implicit-decl.diff
 Patch2:         sssd-ldflags.diff
 Patch3:         sssd-no-ldb-check.diff
-Patch4:         sssd-sysdb-binary-attrs.diff
-# Fixes for CVE-2013-0287 (will be part of 1.9.5) when released
-Patch5:         Provide-a-be_get_account_info_send-function.patch
-Patch6:         Add-unit-tests-for-simple-access-test-by-groups.patch
-Patch7:         Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch
-Patch8:         Resolve-GIDs-in-the-simple-access-provider.patch
-# End Fixed for CVE-2013-0287
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
 %define servicename sssd
@@ -111,6 +103,7 @@
 %if %suse_version >= 1230
 BuildRequires:  gpg-offline
 %endif
+Requires(postun): pam-config
 
 %description
 Provides a set of daemons to manage access to remote directories and
@@ -210,7 +203,7 @@
 %prep
 %{?gpg_verify: %gpg_verify %{S:2}}
 %setup -q
-%patch -P 1 -P 2 -P 3 -P 4 -P 5 -P 6 -P 7 -P 8 -p1
+%patch -P 1 -P 2 -P 3 -p1
 
 %build
 %if 0%{?suse_version} < 1210

++++++ sssd-1.9.4.tar.gz -> sssd-1.9.5.tar.gz ++++++
++++ 60229 lines of diff (skipped)

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to