--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-c582bc56a6
2021-05-22 01:07:28.002854
--------------------------------------------------------------------------------
Name : sssd
Product : Fedora 33
Version : 2.5.0
Release : 2.fc33
URL :
https://github.com/SSSD/sssd/
Summary : System Security Services Daemon
Description :
Provides a set of daemons to manage access to remote directories and
authentication mechanisms. It provides an NSS and PAM interface toward
the system and a pluggable back end system to connect to multiple different
account sources. It is also the basis to provide client auditing and policy
services for projects like FreeIPA.
The sssd subpackage is a meta-package that contains the daemon as well as all
the existing back ends.
--------------------------------------------------------------------------------
Update Information:
Fix a regression in KCM when updating from an older (pre sssd-2.4.0-4.f33)
version directly to 2.5.0.
--------------------------------------------------------------------------------
ChangeLog:
* Wed May 19 2021 Pavel B��ezina <pbrezina(a)redhat.com> - 2.5.0-2
- Fix regression in sssd-kcm when upgrading from 2.4.0 directly to 2.5.0
- Return correct error code for unknown/unsupported operations in sssd-kcm
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1962006 - sssd 2.5.0 breaks kinit
https://bugzilla.redhat.com/show_bug.cgi?id=1962006
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-c582bc56a6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------