[ubuntu/xenial-proposed] ntp 1:4.2.8p4+dfsg-3ubuntu1 (Accepted)
Pierre-André MOREY
pierre-andre.morey at canonical.com
Thu Feb 11 15:00:19 UTC 2016
ntp (1:4.2.8p4+dfsg-3ubuntu1) xenial; urgency=medium
* Merge from Debian testing. Remaining changes:
+ debian/rules: enable debugging. Ask debian to add this.
+ debian/rules, debian/ntp.dirs, debian/source_ntp.py: Add apport hook.
+ Add enforcing AppArmor profile:
- debian/control: Add Conflicts/Replaces on apparmor-profiles.
- debian/control: Add Suggests on apparmor.
- debian/control: Build-Depends on dh-apparmor.
- add debian/apparmor-profile*.
- debian/ntp.dirs: Add apparmor directories.
- debian/rules: Install apparmor-profile and apparmor-profile.tunable.
- debian/source_ntp.py: Add filter on AppArmor profile names to prevent
false positives from denials originating in other packages.
- debian/README.Debian: Add note on AppArmor.
+ debian/ntpdate.if-up: Fix interaction with openntpd. Stop ntp before
running ntpdate when an interface comes up, then start again afterwards.
+ debian/ntp.init, debian/rules: Only stop when entering single user mode,
don't use /var/lib/ntp/ntp.conf.dhcp if /etc/ntp.conf is newer - it can
get stale. Patch by Simon Déziel.
+ debian/ntp.conf, debian/ntpdate.default: Change default server to
ntp.ubuntu.com.
+ debian/control: Add bison to Build-Depends (for ntpd/ntp_parser.y).
* Includes fix for requests with source ports < 123, fixed upstream in
4.2.8p1 (LP: #1479652).
* Add PPS support (LP: #1512980):
+ debian/README.Debian: Add a PPS section to the README.Debian,
removed all PPSkit one.
+ debian/ntp.conf: Add some configuration examples from the offical
documentation.
+ debian/control: Add Build-Depends on pps-tools
* Drop Changes:
+ debian/rules: Update config.{guess,sub} for AArch64, because upstream use
dh_autoreconf now.
+ debian/{control,rules}: Add and enable hardened build for PIE.
Upstream use fPIC. Options -fPIC and -fPIE are uncompatible, thus this is
never applied, (cf. dpkg-buildflags manual), checked with Marc
Deslauriers on freenode #ubuntu-hardened, 2016-01-20~13:11 UTC.
+ debian/rules: Remove update-rcd-params in dh_installinit command. When
setting up ntp package, the following message is presented to the user
due to deprecated use:
"update-rc.d: warning: start and stop actions are no longer
supported; falling back to defaults". The defaults are taken from the
init.d script LSB comment header, which contain what we need anyway.
+ debian/rules: Remove ntp/ntp_parser.{c,h} or they don't get properly
regenerated for some reason. Seems to have been due to ntpd/ntp_parser.y
patches from CVE-2015-5194 and CVE-2015-5196, already upstreamed.
+ debian/ntpdate.if-up: Drop lockfile mechanism as upstream is using flock
now.
+ Remove natty timeframe old deltas (transitional code not needed since
Trusty): Those patches were for an incorrect behaviour of
system-tools-backend, around natty time
(https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/83604/comments/23)
- debian/ntpdate-debian: Disregard empty ntp.conf files.
- debian/ntp.preinst: Remove empty /etc/ntp.conf on fresh intallation.
+ debian/ntp.dhcp: Rewrite sed rules. This was done incorrectly as pointed
out in LP 575458. This decision is explained in detail there.
* All previous ubuntu security patches/fixes have been upstreamed:
+ CVE-2015-5146, CVE-2015-5194, CVE-2015-5195, CVE-2015-5196,
CVE-2015-7703, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691,
CVE-2015-7692, CVE-2015-7702, CVE-2015-7701, CVE-2015-7704,
CVE-2015-7705, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853,
CVE-2015-7855, CVE-2015-7871, CVE-2015-1798, CVE-2015-1799,
CVE-2014-9297, CVE-2014-9298, CVE-2014-9293, CVE-2014-9294,
CVE-2014-9295, CVE-2014-9296
+ Fix to ignore ENOBUFS on routing netlink socket
+ Fix use-after-free in routing socket code
+ ntp-keygen infinite loop or lack of randonmess on big endian platforms
Date: Fri, 5 Feb 2016 18:28:52 +0100
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Robie Basak <robie.basak at canonical.com>
https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p4+dfsg-3ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 5 Feb 2016 18:28:52 +0100
Source: ntp
Binary: ntp ntpdate ntp-doc
Architecture: source
Version: 1:4.2.8p4+dfsg-3ubuntu1
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Description:
ntp - Network Time Protocol daemon and utility programs
ntp-doc - Network Time Protocol documentation
ntpdate - client for setting system time from NTP servers
Launchpad-Bugs-Fixed: 1479652 1512980
Changes:
ntp (1:4.2.8p4+dfsg-3ubuntu1) xenial; urgency=medium
.
* Merge from Debian testing. Remaining changes:
+ debian/rules: enable debugging. Ask debian to add this.
+ debian/rules, debian/ntp.dirs, debian/source_ntp.py: Add apport hook.
+ Add enforcing AppArmor profile:
- debian/control: Add Conflicts/Replaces on apparmor-profiles.
- debian/control: Add Suggests on apparmor.
- debian/control: Build-Depends on dh-apparmor.
- add debian/apparmor-profile*.
- debian/ntp.dirs: Add apparmor directories.
- debian/rules: Install apparmor-profile and apparmor-profile.tunable.
- debian/source_ntp.py: Add filter on AppArmor profile names to prevent
false positives from denials originating in other packages.
- debian/README.Debian: Add note on AppArmor.
+ debian/ntpdate.if-up: Fix interaction with openntpd. Stop ntp before
running ntpdate when an interface comes up, then start again afterwards.
+ debian/ntp.init, debian/rules: Only stop when entering single user mode,
don't use /var/lib/ntp/ntp.conf.dhcp if /etc/ntp.conf is newer - it can
get stale. Patch by Simon Déziel.
+ debian/ntp.conf, debian/ntpdate.default: Change default server to
ntp.ubuntu.com.
+ debian/control: Add bison to Build-Depends (for ntpd/ntp_parser.y).
* Includes fix for requests with source ports < 123, fixed upstream in
4.2.8p1 (LP: #1479652).
* Add PPS support (LP: #1512980):
+ debian/README.Debian: Add a PPS section to the README.Debian,
removed all PPSkit one.
+ debian/ntp.conf: Add some configuration examples from the offical
documentation.
+ debian/control: Add Build-Depends on pps-tools
* Drop Changes:
+ debian/rules: Update config.{guess,sub} for AArch64, because upstream use
dh_autoreconf now.
+ debian/{control,rules}: Add and enable hardened build for PIE.
Upstream use fPIC. Options -fPIC and -fPIE are uncompatible, thus this is
never applied, (cf. dpkg-buildflags manual), checked with Marc
Deslauriers on freenode #ubuntu-hardened, 2016-01-20~13:11 UTC.
+ debian/rules: Remove update-rcd-params in dh_installinit command. When
setting up ntp package, the following message is presented to the user
due to deprecated use:
"update-rc.d: warning: start and stop actions are no longer
supported; falling back to defaults". The defaults are taken from the
init.d script LSB comment header, which contain what we need anyway.
+ debian/rules: Remove ntp/ntp_parser.{c,h} or they don't get properly
regenerated for some reason. Seems to have been due to ntpd/ntp_parser.y
patches from CVE-2015-5194 and CVE-2015-5196, already upstreamed.
+ debian/ntpdate.if-up: Drop lockfile mechanism as upstream is using flock
now.
+ Remove natty timeframe old deltas (transitional code not needed since
Trusty): Those patches were for an incorrect behaviour of
system-tools-backend, around natty time
(https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/83604/comments/23)
- debian/ntpdate-debian: Disregard empty ntp.conf files.
- debian/ntp.preinst: Remove empty /etc/ntp.conf on fresh intallation.
+ debian/ntp.dhcp: Rewrite sed rules. This was done incorrectly as pointed
out in LP 575458. This decision is explained in detail there.
* All previous ubuntu security patches/fixes have been upstreamed:
+ CVE-2015-5146, CVE-2015-5194, CVE-2015-5195, CVE-2015-5196,
CVE-2015-7703, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691,
CVE-2015-7692, CVE-2015-7702, CVE-2015-7701, CVE-2015-7704,
CVE-2015-7705, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853,
CVE-2015-7855, CVE-2015-7871, CVE-2015-1798, CVE-2015-1799,
CVE-2014-9297, CVE-2014-9298, CVE-2014-9293, CVE-2014-9294,
CVE-2014-9295, CVE-2014-9296
+ Fix to ignore ENOBUFS on routing netlink socket
+ Fix use-after-free in routing socket code
+ ntp-keygen infinite loop or lack of randonmess on big endian platforms
Checksums-Sha1:
5ee9272c8404767aac92abb993df0f0668181381 2350 ntp_4.2.8p4+dfsg-3ubuntu1.dsc
5ab8f932917d3587b63f00fe45099dc45cb57d4f 7065768 ntp_4.2.8p4+dfsg.orig.tar.gz
37ae25601b4c10e2ba599a5ae30b0de5eb8023ff 61716 ntp_4.2.8p4+dfsg-3ubuntu1.debian.tar.xz
Checksums-Sha256:
537fa22c3b5abf5aa47158f154338f5e90fc6efe7d5d5c8e4b24f0ea6f4e6580 2350 ntp_4.2.8p4+dfsg-3ubuntu1.dsc
6da2529b5d9ee4ac01fb64d127426b254c6defa3098a456a6f71736920f4e4ed 7065768 ntp_4.2.8p4+dfsg.orig.tar.gz
363f90956d871ef592f8e575f3828d2a0d69aa52bcbff06e7aa81047e76d8d94 61716 ntp_4.2.8p4+dfsg-3ubuntu1.debian.tar.xz
Files:
d108b6e04945a2e3855421404b96594b 2350 net optional ntp_4.2.8p4+dfsg-3ubuntu1.dsc
babfb260562a71f6384ad35c65a4db54 7065768 net optional ntp_4.2.8p4+dfsg.orig.tar.gz
f7cf05011eef4e11871ca4775e95d5d2 61716 net optional ntp_4.2.8p4+dfsg-3ubuntu1.debian.tar.xz
Original-Maintainer: Debian NTP Team <pkg-ntp-maintainers at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=sBWJ
-----END PGP SIGNATURE-----
More information about the Xenial-changes
mailing list