For the record only.. in between 1.13.4 and 1.14.2 (next version after xenial) we have:
2dcf7b9 NSS: Fix NSS responder to cope with fully-qualified usernames 1510d12 test_ipa_subdom_server: Workaround for slow krb5 + SELinux c19374b cache_req tests: use leak check in test fixtures 2dd75ea TOOLS: Fix memory leak after getline() failed 556801e SUDO: fix potential memory leak in sdap_sudo_init 343b053 NSS: fix a use-after-free issue 1584db9 intg: fix assert messages in test_memory_cache 8c9ecf0 PROXY: fix minor memory leak 3fa03d5 SDAP: fix minor memory leak a2d6d4d IPA: fix minor memory leak 12440d2 AD: fix minor memory leak and from 1.14.2 to 1.16_5 (latest release from 1.x series) we have: acce032 lib/cifs_idmap_sss: fixed unaligned mem access d1c9308 tests: fix mocking krb5_creds in test_copy_ccache f62d2af CRYPTO: Save prefix in s3crypt_sha512 6191cf8 KCM: be aware that size_t might have different size than other integers e354ec7 DP/LDAP: Only increase the initgrTimestamp when the full initgroups DP request finishes fd17e09 mmap_cache: Remove unnecessary memchr in client code 2951a9a CRYPTO: Suppress warning Wstringop-truncation 613a832 KCM: Add some forgotten NULL checks f772649 KRB5: Fix access_provider=krb5 327a166 PAM: fix memory leak in pam_sss e6a5f8c WATCHDOG: Avoid non async-signal-safe from the signal_handler f78b2dd krb5: fix two memory leaks as commits that *could* be related. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883614 Title: sssd got killed due to segfault in ubuntu 16.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1883614/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs