-
Tue Dec 18 2018 Michal Židek <mzidek@redhat.com> - 1.16.3-5
- Resolves: rhbz#1659507 - SSSD's LDAP authentication provider does not work
if ID provider is authenticated with GSSAPI [rhel-7.6.z]
-
Tue Dec 18 2018 Michal Židek <mzidek@redhat.com> - 1.16.3-4
- Resolves: rhbz#1659083 - SSSD must be cleared/restarted periodically in
order to retrieve AD users through IPA Trust [rhel-7.6.z]
-
Tue Dec 18 2018 Michal Židek <mzidek@redhat.com> - 1.16.3-3
- Resolves: rhbz#1656833 - sssd_nss memory leak [rhel-7.6.z]
-
Wed Nov 28 2018 Michal Židek <mzidek@redhat.com> - 1.16.3-2
- Resolves: Bug 1649784 - SSSD not fetching all sudo rules from
AD [rhel-7.6.z]
-
Wed Nov 14 2018 Michal Židek <mzidek@redhat.com> - 1.16.3-1
- Resolves: rhbz#1645047 - sssd only sets the SELinux login context if it
differs from the default [rhel-7.6.z]
-
Wed Sep 05 2018 Jakub Hrozek <jhrozek@redhat.com> - 1.16.2-13
- Resolves: rhbz#1593756 - sssd needs to require a newer version of
libtalloc and libtevent to avoid an issue
in GPO processing
-
Thu Aug 09 2018 Fabiano Fidêncio <fidencio@redhat.com> - 1.16.2-12
- Resolves: rhbz#1610667 - sssd_ssh leaks file descriptors when more than one certificate is converted into an SSH key
- Resolves: rhbz#1583360 - The IPA selinux provider can return an error if SELinux is completely disabled
-
Thu Aug 02 2018 Jakub Hrozek <jhrozek@redhat.com> - 1.16.2-11
- Resolves: rhbz#1602781 - Local users failed to login with same password
-
Wed Aug 01 2018 Jakub Hrozek <jhrozek@redhat.com> - 1.16.2-10
- Resolves: rhbz#1586127 - Spurious check in the sssd nss memcache can cause the memory cache to be skipped
-
Thu Jul 26 2018 Jakub Hrozek <jhrozek@redhat.com> - 1.16.2-9
- Resolves: rhbz#1522928 - sssd doesn't allow user with expired password