[ubuntu/xenial-proposed] linux-meta-aws-hwe 4.15.0.1042.42 (Accepted)
linux-meta-aws-hwe (4.15.0.1042.42) xenial; urgency=medium * Bump ABI 4.15.0-1042 Date: 2019-06-20 15:33:59.690883+00:00 Changed-By: Jesse Sung Signed-By: Steve Langasek https://launchpad.net/ubuntu/+source/linux-meta-aws-hwe/4.15.0.1042.42 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-aws-hwe 4.15.0-1042.44~16.04.1 (Accepted)
linux-aws-hwe (4.15.0-1042.44~16.04.1) xenial; urgency=medium * linux-aws-hwe: 4.15.0-1042.44~16.04.1 -proposed tracker (LP: #1832547) [ Ubuntu: 4.15.0-1042.44 ] * linux-aws: 4.15.0-1042.44 -proposed tracker (LP: #1832552) * linux: 4.15.0-53.57 -proposed tracker (LP: #1832578) * CVE-2019-11479 - SAUCE: tcp: add tcp_min_snd_mss sysctl - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() * CVE-2019-11085 - drm/i915/gvt: Fix mmap range check - drm/i915: make mappable struct resource centric - drm/i915/gvt: Fix aperture read/write emulation when enable x-no-mmap=on * CVE-2019-11884 - Bluetooth: hidp: fix buffer overflow * af_alg06 test from crypto test suite in LTP failed with kernel oops on B/C (LP: #1829725) - crypto: authenc - fix parsing key with misaligned rta_len * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 // CVE-2019-11091 - SAUCE: Synchronize MDS mitigations with upstream - Documentation: Correct the possible MDS sysfs values - x86/speculation/mds: Fix documentation typo * CVE-2019-11091 - x86/mds: Add MDSUM variant to the MDS documentation * alignment test in powerpc from ubuntu_kernel_selftests failed on B/C Power9 (LP: #1813118) - selftests/powerpc: Remove Power9 copy_unaligned test * TRACE_syscall.ptrace_syscall_dropped in seccomp from ubuntu_kernel_selftests failed on B/C PowerPC (LP: #1812796) - selftests/seccomp: Enhance per-arch ptrace syscall skip tests * Add powerpc/alignment_handler test for selftests (LP: #1828935) - selftests/powerpc: Add alignment handler selftest - selftests/powerpc: Fix to use ucontext_t instead of struct ucontext * Cannot build kernel 4.15.0-48.51 due to an in-source-tree ZFS module. (LP: #1828763) - SAUCE: (noup) Update zfs to 0.7.5-1ubuntu16.5 * Eletrical noise occurred when external headset enter powersaving mode on a DEll machine (LP: #1828798) - ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone - ALSA: hda/realtek - Fixup headphone noise via runtime suspend * [18.04/18.10] File libperf-jvmti.so is missing in linux-tools-common deb on Ubuntu (LP: #1761379) - [Packaging] Support building libperf-jvmti.so * TCP : race condition on socket ownership in tcp_close() (LP: #1830813) - tcp: do not release socket ownership in tcp_close() * bionic: netlink: potential shift overflow in netlink_bind() (LP: #1831103) - netlink: Don't shift on 64 for ngroups * Add support to Comet Lake LPSS (LP: #1830175) - mfd: intel-lpss: Add Intel Comet Lake PCI IDs * Reduce NAPI weight in hns driver from 256 to 64 (LP: #1830587) - net: hns: Use NAPI_POLL_WEIGHT for hns driver * x86: add support for AMD Rome (LP: #1819485) - x86: irq_remapping: Move irq remapping mode enum - iommu/amd: Add support for higher 64-bit IOMMU Control Register - iommu/amd: Add support for IOMMU XT mode - hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs - hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs - x86/amd_nb: Add PCI device IDs for family 17h, model 30h - x86/MCE/AMD: Fix the thresholding machinery initialization order - x86/amd_nb: Add support for newer PCI topologies * nx842 - CRB request time out (-110) when uninstall NX modules and initiate NX request (LP: #1827755) - crypto/nx: Initialize 842 high and normal RxFIFO control registers * Require improved hypervisor detection patch in Ubuntu 18.04 (LP: #1829972) - s390/early: improve machine detection Date: 2019-06-20 15:33:17.293984+00:00 Changed-By: Jesse Sung Signed-By: Steve Langasek https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1042.44~16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.40 (Accepted)
qemu (1:2.5+dfsg-5ubuntu10.40) xenial; urgency=medium * Restore patches that caused regression - d/p/lp1823458/add-VirtIONet-vhost_stopped-flag-to-prevent-multiple.patch - d/p/lp1823458/do-not-call-vhost_net_cleanup-on-running-net-from-ch.patch * Fix regression introduced by above patches (LP: #1829380) - d/p/lp1829380.patch [ Rafael David Tinoco ] * d/p/lp1828288/target-i386-Set-AMD-alias-bits-after-filtering-CPUID.patch - Fix issues with CPUID_EXT2_AMD_ALIASES allowing guests using cpu passthrough to boot. (LP: #1828288) Date: 2019-05-16 20:27:09.894698+00:00 Changed-By: Dan Streetman Signed-By: Steve Langasek https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.40 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] ec2-hibinit-agent 1.0.0-0ubuntu4~16.04.2 (Accepted)
ec2-hibinit-agent (1.0.0-0ubuntu4~16.04.2) xenial; urgency=medium * Drop 0007-Match-ACPI-sleep-action-in-a-very-liberal-way.patch. It turned out LP: #1831103 was responsible for the missing SBTN event and where it was fixed two events were handled causing two hibernations. * Call swapoff via systemd-run to avoid the command getting killed on timeout. Also stop swap after restarting systemd-networkd to recover network connectivity earlier. * debian/hibinit-agent.system-sleep: Restart systemd-networkd with --no-block to finish running the hook faster. * Drop 0007-Match-ACPI-sleep-action-in-a-very-liberal-way.patch. It turned out LP: #1831103 was responsible for the missing SBTN event and where it was fixed two events were handled causing two hibernations. * Call swapoff via systemd-run to avoid the command getting killed on timeout. Also stop swap after restarting systemd-networkd to recover network connectivity earlier. * debian/hibinit-agent.system-sleep: Restart systemd-networkd with --no-block to finish running the hook faster. ec2-hibinit-agent (1.0.0-0ubuntu4~16.04.1) xenial; urgency=medium * Restart systemd-networkd on resuming from hibernation. On resume the system sometimes does not restore network connections and this is a way of reliably triggering the restoration. (LP: #1830427) Date: 2019-06-07 15:23:09.636006+00:00 Changed-By: Balint Reczey Signed-By: Steve Langasek https://launchpad.net/ubuntu/+source/ec2-hibinit-agent/1.0.0-0ubuntu4~16.04.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] intel-microcode 3.20190618.0ubuntu0.16.04.1 (Accepted)
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) intel-microcode (3.20190514.0ubuntu0.18.04.3) bionic-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. intel-microcode (3.20190514.0ubuntu0.18.04.2) bionic-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x310, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x41c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x521, size 47104 + Updated Microcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb36, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x25e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x717, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf15, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe0d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720 Date: 2019-06-20 16:22:13.785683+00:00 Changed-By: Steve Beattie Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/intel-microcode/3.20190618.0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] intel-microcode 3.20190618.0ubuntu0.16.04.1 (Accepted)
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) intel-microcode (3.20190514.0ubuntu0.18.04.3) bionic-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. intel-microcode (3.20190514.0ubuntu0.18.04.2) bionic-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x310, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x41c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x521, size 47104 + Updated Microcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb36, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x25e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x717, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf15, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe0d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720 Date: 2019-06-20 16:22:13.785683+00:00 Changed-By: Steve Beattie https://launchpad.net/ubuntu/+source/intel-microcode/3.20190618.0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] mosquitto 1.4.8-1ubuntu0.16.04.7 (Accepted)
mosquitto (1.4.8-1ubuntu0.16.04.7) xenial-security; urgency=medium * SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings - debian/patches/add-validate-utf8.patch: Add validate UTF-8 - debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation fixes - CVE-2017-7653 * SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated clients to send crafted CONNECT packets which could cause DoS - debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused by a malicious CONNECT packet - CVE-2017-7654 Date: 2019-06-19 19:08:13.166199+00:00 Changed-By: Eduardo dos Santos Barretto Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/mosquitto/1.4.8-1ubuntu0.16.04.7 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] mosquitto 1.4.8-1ubuntu0.16.04.7 (Accepted)
mosquitto (1.4.8-1ubuntu0.16.04.7) xenial-security; urgency=medium * SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings - debian/patches/add-validate-utf8.patch: Add validate UTF-8 - debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation fixes - CVE-2017-7653 * SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated clients to send crafted CONNECT packets which could cause DoS - debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused by a malicious CONNECT packet - CVE-2017-7654 Date: 2019-06-19 19:08:13.166199+00:00 Changed-By: Eduardo dos Santos Barretto https://launchpad.net/ubuntu/+source/mosquitto/1.4.8-1ubuntu0.16.04.7 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] thunderbird 1:60.7.1+build1-0ubuntu0.16.04.1 (Accepted)
thunderbird (1:60.7.1+build1-0ubuntu0.16.04.1) xenial; urgency=medium * New upstream stable release (60.7.1build1) Date: 2019-06-13 10:27:14.345780+00:00 Changed-By: Olivier Tilloy Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/thunderbird/1:60.7.1+build1-0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] thunderbird 1:60.7.1+build1-0ubuntu0.16.04.1 (Accepted)
thunderbird (1:60.7.1+build1-0ubuntu0.16.04.1) xenial; urgency=medium * New upstream stable release (60.7.1build1) Date: 2019-06-13 10:27:14.345780+00:00 Changed-By: Olivier Tilloy Signed-By: Chris Coulson https://launchpad.net/ubuntu/+source/thunderbird/1:60.7.1+build1-0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] sssd 1.13.4-1ubuntu1.15 (Accepted)
sssd (1.13.4-1ubuntu1.15) xenial; urgency=medium * d/libsss-sudo.postinst: Add sss entry to nsswitch only on initial install. (LP: #1781991) Date: Tue, 28 May 2019 10:49:17 -0300 Changed-By: Andreas Hasenack Maintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/sssd/1.13.4-1ubuntu1.15 Format: 1.8 Date: Tue, 28 May 2019 10:49:17 -0300 Source: sssd Binary: sssd sssd-common sssd-ad sssd-ad-common sssd-dbus sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy sssd-tools libnss-sss libpam-sss libipa-hbac0 libipa-hbac-dev libsss-idmap0 libsss-idmap-dev libsss-nss-idmap0 libsss-nss-idmap-dev libsss-sudo libsss-simpleifp0 libsss-simpleifp-dev libwbclient-sssd libwbclient-sssd-dev python-libipa-hbac python-libsss-nss-idmap python-sss python3-libipa-hbac python3-libsss-nss-idmap python3-sss Architecture: source Version: 1.13.4-1ubuntu1.15 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Andreas Hasenack Description: libipa-hbac-dev - FreeIPA HBAC Evaluator library libipa-hbac0 - FreeIPA HBAC Evaluator library libnss-sss - Nss library for the System Security Services Daemon libpam-sss - Pam module for the System Security Services Daemon libsss-idmap-dev - ID mapping library for SSSD -- development files libsss-idmap0 - ID mapping library for SSSD libsss-nss-idmap-dev - SID based lookups library for SSSD -- development files libsss-nss-idmap0 - SID based lookups library for SSSD libsss-simpleifp-dev - SSSD D-Bus responder helper library -- development files libsss-simpleifp0 - SSSD D-Bus responder helper library libsss-sudo - Communicator library for sudo libwbclient-sssd - SSSD libwbclient implementation libwbclient-sssd-dev - SSSD libwbclient implementation -- development files python-libipa-hbac - Python bindings for the FreeIPA HBAC Evaluator library python-libsss-nss-idmap - Python bindings for the SID lookups library python-sss - Python module for the System Security Services Daemon python3-libipa-hbac - Python3 bindings for the FreeIPA HBAC Evaluator library python3-libsss-nss-idmap - Python3 bindings for the SID lookups library python3-sss - Python3 module for the System Security Services Daemon sssd - System Security Services Daemon -- metapackage sssd-ad- System Security Services Daemon -- Active Directory back end sssd-ad-common - System Security Services Daemon -- PAC responder sssd-common - System Security Services Daemon -- common files sssd-dbus - System Security Services Daemon -- D-Bus responder sssd-ipa - System Security Services Daemon -- IPA back end sssd-krb5 - System Security Services Daemon -- Kerberos back end sssd-krb5-common - System Security Services Daemon -- Kerberos helpers sssd-ldap - System Security Services Daemon -- LDAP back end sssd-proxy - System Security Services Daemon -- proxy back end sssd-tools - System Security Services Daemon -- tools Launchpad-Bugs-Fixed: 1781991 Changes: sssd (1.13.4-1ubuntu1.15) xenial; urgency=medium . * d/libsss-sudo.postinst: Add sss entry to nsswitch only on initial install. (LP: #1781991) Checksums-Sha1: 510be1d9269b516d0e938047dca3f2018f6d6b81 4530 sssd_1.13.4-1ubuntu1.15.dsc e2d8611b0f21e2d5ee3c51ef86b37c50010f76fe 1463352 sssd_1.13.4-1ubuntu1.15.diff.gz Checksums-Sha256: c617734a41dca359c5fdcce969b35760f03dbc473cdbee7526bc7118fb3cb768 4530 sssd_1.13.4-1ubuntu1.15.dsc 747f365888ee685468d4988b6400b4cfe857ed6f05d42ca697aa8d01a36d3b56 1463352 sssd_1.13.4-1ubuntu1.15.diff.gz Files: 475f49ed4ccd95b491cb9e01271b6228 4530 utils extra sssd_1.13.4-1ubuntu1.15.dsc 0bbdedd58adcbcc5f7c3ebc54f1ac421 1463352 utils extra sssd_1.13.4-1ubuntu1.15.diff.gz Original-Maintainer: Debian SSSD Team -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes