Linux repositories inspector

libnss-myhostname - nss module providing fallback resolution for the current hostname

This package contains a plugin for the Name Service Switch, providing host name resolution for the locally configured system hostname as returned by gethostname(2). It returns all locally configured public IP addresses or -- if none are configured, the IPv4 address 127.0.1.1 (which is on the local loopback) and the IPv6 address ::1 (which is the local host).
A lot of software relies on that the local host name is resolvable. This package provides an alternative to the fragile and error-prone manual editing of /etc/hosts.
Installing this package automatically adds myhostname to /etc/nsswitch.conf.
241
Debian iconDebian 10.0
Debian iconDebian 9.0
240
Ubuntu iconUbuntu 19.04
239
Ubuntu iconUbuntu 18.10
237
Ubuntu iconUbuntu 18.04 LTS
234
Ubuntu iconUbuntu 17.10
232
Debian iconDebian 9.0
229
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb241-310.04.2019119 kiB194 kiB
Debian iconDebian 9.0 stretch/maindeb232-25+deb9u816.02.2019103 kiB175 kiB
Debian iconDebian 9.0 stretch-backports/maindeb241-1~bpo9+110.03.2019119 kiB193 kiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb232-25+deb9u1005.04.2019104 kiB175 kiB
Ubuntu iconUbuntu 17.10 artful/maindeb234-2ubuntu1210.11.201730.9 kiB170 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb234-2ubuntu12.110.11.201731 kiB170 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb234-2ubuntu12.412.06.201831.6 kiB171 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb237-3ubuntu1012.06.201832.8 kiB185 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-proposed/maindeb237-3ubuntu10.2008.04.201933.3 kiB188 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb237-3ubuntu10.1908.04.201933.1 kiB187 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb237-3ubuntu10.1908.04.201933.1 kiB187 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb239-7ubuntu1014.01.201933.9 kiB191 kiB
Ubuntu iconUbuntu 18.10 cosmic-proposed/maindeb239-7ubuntu10.1308.04.201933.1 kiB193 kiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb239-7ubuntu10.1208.04.201932.8 kiB193 kiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb239-7ubuntu10.1208.04.201932.8 kiB193 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb240-6ubuntu410.04.201935.7 kiB209 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb229-4ubuntu410.11.201739.3 kiB155 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb229-4ubuntu21.2108.04.201934.2 kiB160 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb229-4ubuntu21.2108.04.201934.2 kiB160 kiB

Manual pages

nss-myhostname(8)

nss-myhostname, libnss_myhostname.so.2 - Provide hostname resolution for the locally configured system hostname.

Latest updates

Debian 10.0 icon

Debian 10.0 buster/main: Updated from 241-1 to 241-3

10.04.2019 17:07
Michael Biebl
  • Drop systemd-shim alternative from libpam-systemd.
    A fixed systemd-shim package which works with newer versions of systemd is unlikely to happen given that the systemd-shim package has been removed from the archive. Drop the alternative dependency from libpam-systemd accordingly.
  • Properly remove duplicate directories from systemd package. When removing duplicate directories from the systemd package, sort the list of directories in reverse order so we properly delete nested directories.
  • udev: Run programs in the specified order (Closes: #925190)
  • bash-completion: Use default completion for redirect operators (Closes: #924541)
  • networkd: Clarify that IPv6 RA uses our own stack, no the kernel's (Closes: #815582)
  • Revert "Drop systemd-timesyncd.service.d/disable-with-time-daemon.conf" Apparently Conflicts= are not a reliable mechanism to ensure alternative NTP implementations take precedence over systemd-timesyncd. (Closes: #902026)
  • network: Fix routing policy rule issue.
    When multiple links request a routing policy, make sure they are all applied correctly. (Closes: #924406)
  • pam-systemd: Use secure_getenv() rather than getenv() Fixes a vulnerability in the systemd PAM module which insecurely uses the environment and lacks seat verification permitting spoofing an active session to PolicyKit. (CVE-2019-3842)
Martin Pitt
  • Enable udev autopkgtest in containers.
    This test doesn't actually need udev.service (which is disabled in containers) and works fine in LXC.
  • Enable boot-and-service autopkgtest in containers
    • Skip tests which can't work in containers.
    • Add missing rsyslog test dependency.
    • e2scrub_reap.service fails in containers, ignore (filed as #926138)
    • Relax pgrep pattern for gdm, as there's no wayland session in containers.
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 removed

10.04.2019 14:39
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Updated from 240-6ubuntu3 to 240-6ubuntu4

10.04.2019 14:36
Ubuntu 19.04 icon

Ubuntu 19.04 disco-proposed/main: Version 240-6ubuntu4 introduced

10.04.2019 08:45
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.20 introduced

08.04.2019 15:45
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/fix-test-22.patch
      • fix TEST-22 failures
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
      Dimitri John Ledkov
      • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.13 introduced

08.04.2019 15:25
Ioanna Alifieraki
  • d/p/backport_network-fix-return-value-of-routing_policy_rule_get.patch, d/p/backport_network-remove-routing-policy-rule-from-foreign.patch, d/p/backport_network-do-not-remove-rule-when-requested-by-existing-links.patch:
    • Fix RoutingPolicyRule does not apply correctly (LP: #1818282)
    Dan Streetman
    • d/p/networkd-Track-address-configuration.patch,
      d/p/networkd-Use-only-a-generic-CONFIGURING-state.patch,
      d/p/networkd-don-t-remove-route.patch,
      d/p/networkd-don-t-remove-ip-address.patch,
      d/p/Move-link_check_ready-to-later-in-the-file.patch,
      d/p/network-set-_configured-flags-to-false-before-reques.patch, d/p/Install-routes-after-addresses-are-ready.patch:
      • PreferredSource not working in *.network files (LP: #1812760)
    • Specify Ubuntu's Vcs-Git
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.11 to 239-7ubuntu10.12

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.19 to 229-4ubuntu21.21

08.04.2019 09:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.17 to 237-3ubuntu10.19

08.04.2019 09:25
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 229-4ubuntu21.16 to 229-4ubuntu21.21

08.04.2019 08:30
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 237-3ubuntu10.13 to 237-3ubuntu10.19

08.04.2019 08:15
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-security/main: Updated from 239-7ubuntu10.8 to 239-7ubuntu10.12

08.04.2019 07:35
  • SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to incorrect Policykit authorization
    • debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than getenv() in pam_systemd.c
    • CVE-2019-3842
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-proposed/main: Version 239-7ubuntu10.11 removed

06.04.2019 01:55
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-proposed/main: Version 237-3ubuntu10.17 removed

06.04.2019 01:50
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 removed

06.04.2019 01:25
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 232-25+deb9u9 to 232-25+deb9u10

05.04.2019 05:18
  • journald: fix assertion failure on journal_file_link_data (Closes: #916880)
  • tmpfiles: fix "e" to support shell style globs (Closes: #918400)
  • mount-util: accept that name_to_handle_at() might fail with EPERM. Container managers frequently block name_to_handle_at(), returning EACCES or EPERM when this is issued. Accept that, and simply fall back to fdinfo-based checks. (Closes: #917122)
  • automount: ack automount requests even when already mounted. Fixes a race condition in systemd which could result in automount requests not being serviced and processes using them to hang, causing denial of service. (CVE-2018-1049)
  • core: when deserializing state always use read_line(…, LONG_LINE_MAX, …) Fixes improper serialization on upgrade which can influence systemd execution environment and lead to root privilege escalation. (CVE-2018-15686, Closes: #912005)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 229-4ubuntu21.17 to 229-4ubuntu21.19

04.04.2019 13:25
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic-updates/main: Updated from 239-7ubuntu10.10 to 239-7ubuntu10.11

04.04.2019 13:20
  • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 237-3ubuntu10.15 to 237-3ubuntu10.17

04.04.2019 13:00
Michael Vogt
  • d/p/Support-system-image-read-only-etc.patch:
    • re-add support for /etc/writable for core18 (LP: #1778936)
  • d/p/fix-race-daemon-reload-8803.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 229-4ubuntu21.19 introduced

25.03.2019 15:15
Michael Vogt
  • d/p/fix-race-daemon-reload-11121.patch:
    • backport systemd upstream PR#8803 and PR#11121 to fix race when doing systemctl and systemctl daemon-reload at the same time LP: #1819728
    Balint Reczey
    • d/p/virt-detect-WSL-environment-as-a-container.patch:
      • virt: detect WSL environment as a container (LP: #1816753)
⇧ Top