[ubuntu/trusty-updates] sssd 1.11.8-0ubuntu0.7 (Accepted)

2017-06-07 Thread Łukasz Zemczak
sssd (1.11.8-0ubuntu0.7) trusty; urgency=medium

  * Fix regression where SSSD doesn't start on boot if autofs is not
installed (LP: #1695870):
- rules: Support new service
- sssd-common.sssd-autofs.upstart.in: Restart autofs to read direct mounts
after SSSD and autofs have started (only on startup). This keeps the fix
for the autofs and SSSD race condition (LP: #1566508)
- sssd-common.sssd.upstart.in: Remove "starting autofs" to allow SSSD to
start without autofs.

Date: 2017-06-05 15:15:12.074050+00:00
Changed-By: Victor Tapia 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/sssd/1.11.8-0ubuntu0.7
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] nagios3 3.5.1-1ubuntu1.3 (Accepted)

2017-06-07 Thread Ubuntu Archive Robot
nagios3 (3.5.1-1ubuntu1.3) trusty-security; urgency=medium

  * SECURITY REGRESSION: event log cannot open log file (LP: #1690380)
- debian/patches/CVE-2016-9566-regression.patch: relax permissions on
  log files in base/logging.c.
- debian/nagios3-common.postinst: fix permissions on existing log file.

nagios3 (3.5.1-1ubuntu1.2) trusty; urgency=medium

  * debian/patches/fix_permissions_for_hostgroups_reports.patch: Fix
permissions for hostgroups reports.  Thanks to John C. Frickson
.  Closes LP: #1686768.

Date: 2017-06-06 13:36:16.166909+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/nagios3/3.5.1-1ubuntu1.3
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] nagios3 3.5.1-1ubuntu1.3 (Accepted)

2017-06-07 Thread Marc Deslauriers
nagios3 (3.5.1-1ubuntu1.3) trusty-security; urgency=medium

  * SECURITY REGRESSION: event log cannot open log file (LP: #1690380)
- debian/patches/CVE-2016-9566-regression.patch: relax permissions on
  log files in base/logging.c.
- debian/nagios3-common.postinst: fix permissions on existing log file.

nagios3 (3.5.1-1ubuntu1.2) trusty; urgency=medium

  * debian/patches/fix_permissions_for_hostgroups_reports.patch: Fix
permissions for hostgroups reports.  Thanks to John C. Frickson
.  Closes LP: #1686768.

Date: 2017-06-06 13:36:16.166909+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/nagios3/3.5.1-1ubuntu1.3
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] snapd 2.26.4~14.04 (Accepted)

2017-06-07 Thread Michael Vogt
snapd (2.26.4~14.04) trusty; urgency=medium

  * New upstream release, LP: #1690083
- partly revert aace15ab53 to unbreak core reverts
- Revert "interfaces: re-add reverted ioctl and quotactl (revert 21bc6b9f)"
- Disable "mknod |N" in the default seccomp template
  reasons outline in 
https://forum.snapcraft.io/t/snapd-2-25-blocked-because-of-revert-race-condition
- errtracker: include bits of snap-confine apparmor profile
- errtracker: report if snapd did re-execute itself

snapd (2.26.3~14.04) trusty; urgency=medium

  * New upstream release, LP: #1690083
- cherry pick test fixes f0103a6, 9de5c8a, d7725a7 to make
  sure the image tests are updated for the changes in the
  `snap info core` output and the removal of the rsyslog
  package from core.

snapd (2.26.2~14.04) trusty; urgency=medium

  * New upstream release, LP: #1690083
- cherry pick d444728 to make the uboot.env file parsing more
  robust

snapd (2.26.1~14.04) trusty; urgency=medium

  * New upstream release, LP: #1690083
- store: fix panic error in auth
- tests: the new ubuntu-image snap needs classic confinement, adjust
  tests
- cmd/snap-confine: don't fail on pre 3.8 kernel

snapd (2.26~14.04) trusty; urgency=medium

  * New upstream release, LP: #1690083
- timeutil: avoid panicking when the window is very small
- image: fix go vet issue
- overlord/ifacestate: don't spam logs with harmless auto-connect
  messages
- interfaces/builtin: add network-status interface
- interfaces/builtin: add online-accounts-service interface
- interfaces/builtin: distribute code of touching allInterfaces
- interfaces: API additions for interface hooks
- interfaces/builtin: add storage-framework-service interface
- tests: disable create-key test on ppc64el for artful (expect not
  working)
- snap: make `snap prepare-image --extra-snaps` derive side info
- tests: unify tests/{main/completion,completion}/lib.exp0
- cmd/snap: tweak info channels output
- interfaces: ensure that legacy interface methods are unused
- packaging: cleanup how built-using is generated
- tests: extend kernel-module-control interface test
- interfaces/network: workaround Go's need for NETLINK_ROUTE with
  'net'.
- cmd/snap-confine: use defensive argument parser
- tests: add test for empty snap name on revert
- overlord/hookstate: remove unused Context.timeout
- tests: additional setup in docker test for core systems
- configstate: return error if patch is invalid
- interfaces: add random interface
- store, daemon, client, cmd/snap: handle PASSWORD_POLICY_ERROR
- cmd/snap, client: add "whoami" command
- cmd/snap: iterate interface tab completion
- snap: move locale-control to only be present on classic
- interfaces/browser-support: deny read on squashfs backing files
  and LVM vg names
- tests: wait for the docker socket to be listening
- snap: add `snap refresh --time` option
- tests: re-enable and moderninze /media sharing test
- cmd: make rst2man optional
- tests: remove quoting from [[ ]] when globs
- interfaces: allow plugging DBus clients to introspect the slot
  service
- packaging/ubuntu*/changelog: drop extra dash
- snap-confine: init the ENTRY variable, coverity is unhappy
  otherwise
- cmd/snap-confine/spread-tests: discard useless --version test
- spread: add spread target qemu:debian-9-64
- interfaces: mediate netlink sockets via seccomp
- tests,cmd/snap-confine: port older snapd-discard-ns tests
- cmd/snap-confine/tests: fix shellcheck on recently added files
- tests/upgrade: force install core snap from beta for debian
- overlord/snapstate/backend,interfaces/mount: move ns management
  code.
- tests: extend network-control spread test to cope with network
  namespaces
- tests: fail early in the spread suite if trying to run it inside a
  container
- tests: set ownership of $PROJECT_PATH for the external backend
- tests: specify the auto-refreshable snap being tested
- many: fix tests with go1.8 / artful
- fix for tests: debian does not have /snap/bin in secure_path so
  sudo
- snap: support for snap tasks --last=...
- cmd/snap-confine: remove obsolete debug message
- address review feedback, add a lot of comments :-), call
  shellcheck on the completion scripts, fix a bug in compopt

Date: Thu, 01 Jun 2017 18:50:52 +0200
Changed-By: Michael Vogt 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/snapd/2.26.4~14.04
Format: 1.8
Date: Thu, 01 Jun 2017 18:50:52 +0200
Source: snapd
Binary: golang-github-ubuntu-core-snappy-dev golang-github-snapcore-snapd-dev 
snapd ubuntu-snappy ubuntu-snappy-cli ubuntu-core-snapd-units snap-confine 
ubuntu-core-launcher
Architecture: source
Version: 

[ubuntu/trusty-updates] walinuxagent 2.2.12-0ubuntu1~14.04.1 (Accepted)

2017-06-07 Thread Chris J Arges
walinuxagent (2.2.12-0ubuntu1~14.04.1) trusty; urgency=medium

  * Backport artful version to trusty.
  * New upstream release (LP: #1690854).
- Refreshed debian/patches/disable_import_test.patch.

walinuxagent (2.2.9-0ubuntu1) zesty; urgency=medium

  * New upstream release (LP: #1683521).

Date: 2017-05-31 10:21:13.833247+00:00
Changed-By: Łukasz Zemczak 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/walinuxagent/2.2.12-0ubuntu1~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes