[ubuntu/trusty-proposed] systemd 204-5ubuntu6 (Accepted)

Martin Pitt martin.pitt at ubuntu.com
Wed Nov 13 13:02:15 UTC 2013


systemd (204-5ubuntu6) trusty; urgency=low

  * Add pam-check-runtime-dir-user.patch: Don't set an existing
    $XDG_RUNTIME_DIR in the PAM module if it isn't owned by the session user.
    Otherwise su sessions get a runtime dir from a different user which leads
    to either permission errors or scribbling over the other user's files.
    (LP: #1197395)
  * Update debian/extra/60-keyboard.hwdb from current upstream trunk:
    - Fix Lenovo Z370 (LP: #1245189)

Date: Wed, 13 Nov 2013 14:00:55 +0100
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/systemd/204-5ubuntu6
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 13 Nov 2013 14:00:55 +0100
Source: systemd
Binary: systemd systemd-sysv systemd-services libpam-systemd libsystemd-login0 libsystemd-login-dev libsystemd-daemon0 libsystemd-daemon-dev libsystemd-journal0 libsystemd-journal-dev libsystemd-id128-0 libsystemd-id128-dev udev libudev1 libudev-dev udev-udeb libudev1-udeb libgudev-1.0-0 gir1.2-gudev-1.0 libgudev-1.0-dev python-systemd
Architecture: source
Version: 204-5ubuntu6
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Description: 
 gir1.2-gudev-1.0 - libgudev-1.0 introspection data
 libgudev-1.0-0 - GObject-based wrapper library for libudev
 libgudev-1.0-dev - libgudev-1.0 development files
 libpam-systemd - system and service manager - PAM module
 libsystemd-daemon-dev - systemd utility library - development files
 libsystemd-daemon0 - systemd utility library
 libsystemd-id128-0 - systemd 128 bit ID utility library
 libsystemd-id128-dev - systemd 128 bit ID utility library - development files
 libsystemd-journal-dev - systemd journal utility library - development files
 libsystemd-journal0 - systemd journal utility library
 libsystemd-login-dev - systemd login utility library - development files
 libsystemd-login0 - systemd login utility library
 libudev-dev - libudev development files
 libudev1   - libudev shared library
 libudev1-udeb - libudev shared library (udeb)
 python-systemd - python bindings for systemd
 systemd    - system and service manager
 systemd-services - systemd runtime services
 systemd-sysv - system and service manager - SysV links
 udev       - /dev/ and hotplug management daemon
 udev-udeb  - /dev/ and hotplug management daemon (udeb)
Launchpad-Bugs-Fixed: 1197395 1245189
Changes: 
 systemd (204-5ubuntu6) trusty; urgency=low
 .
   * Add pam-check-runtime-dir-user.patch: Don't set an existing
     $XDG_RUNTIME_DIR in the PAM module if it isn't owned by the session user.
     Otherwise su sessions get a runtime dir from a different user which leads
     to either permission errors or scribbling over the other user's files.
     (LP: #1197395)
   * Update debian/extra/60-keyboard.hwdb from current upstream trunk:
     - Fix Lenovo Z370 (LP: #1245189)
Checksums-Sha1: 
 041f8fcbfcd24a8c5efe60f4f33f41b14270587e 3759 systemd_204-5ubuntu6.dsc
 4f2cf0ab33b350afce7b93722d4515729474055b 151211 systemd_204-5ubuntu6.debian.tar.gz
Checksums-Sha256: 
 42f663aaaf6ee9b602e3a2afda275c286ffc24109a23ed43e829bd86a3e152ee 3759 systemd_204-5ubuntu6.dsc
 637caab080eed2f644b44d3a63fb26979f8a02c1e58213e247be9b470deec657 151211 systemd_204-5ubuntu6.debian.tar.gz
Files: 
 8e427a16231140e4d026089230c9b5fc 3759 admin optional systemd_204-5ubuntu6.dsc
 552bdc85f033bbf729fa07fcbc7a9b81 151211 admin optional systemd_204-5ubuntu6.debian.tar.gz
Original-Maintainer: Debian systemd Maintainers <pkg-systemd-maintainers at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=cpqU
-----END PGP SIGNATURE-----


More information about the Trusty-changes mailing list