Package: ntp
Version: 1: 4.2.8p12+dfsg-4
It seems that the bug happened again in version 1: 4.2.8p12+dfsg-4 because
of the apparmor, checking in logs here.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883022

[    0.298598] Mountpoint-cache hash table entries: 8192 (order: 4, 65536
bytes)
[   10.285550] audit: type=1400 audit(1561808943.458:2): apparmor="STATUS"
operation="profile_load" profile="unconfined" name="/usr/sbin/ntpd" pid=282
comm="apparmor_parser"
[  944.068018] audit: type=1400 audit(1561820678.188:22): apparmor="STATUS"
operation="profile_replace" profile="unconfined" name="/usr/sbin/ntpd"
pid=6829 comm="apparmor_parser"
[ 1126.048457] audit: type=1400 audit(1561820860.167:23): apparmor="STATUS"
operation="profile_replace" profile="unconfined" name="/usr/sbin/ntpd"
pid=7592 comm="apparmor_parser"

Jun 26 21:41:30 debian-pc kernel: [ 4101.350713] audit: type=1400
audit(1561596090.032:19): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=24985 comm="apparmor_parser"
Jun 26 22:37:37 debian-pc kernel: [    9.741181] audit: type=1400
audit(1561599450.929:8): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=277 comm="apparmor_parser"
Jun 26 22:41:00 debian-pc kernel: [   10.652741] audit: type=1400
audit(1561599654.837:4): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=274 comm="apparmor_parser"
Jun 26 22:50:41 debian-pc kernel: [    9.819088] audit: type=1400
audit(1561600236.014:3): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=280 comm="apparmor_parser"
Jun 26 23:02:29 debian-pc kernel: [    9.799241] audit: type=1400
audit(1561600943.966:8): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=274 comm="apparmor_parser"
Jun 26 23:05:03 debian-pc kernel: [    9.737864] audit: type=1400
audit(1561601097.926:2): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=278 comm="apparmor_parser"
Jun 26 23:12:17 debian-pc kernel: [    9.698507] audit: type=1400
audit(1561601530.888:8): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=276 comm="apparmor_parser"
Jun 27 09:46:42 debian-pc kernel: [   10.133655] audit: type=1400
audit(1561639596.323:10): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=281 comm="apparmor_parser"
Jun 27 11:38:25 debian-pc kernel: [    9.804472] audit: type=1400
audit(1561646299.968:2): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=274 comm="apparmor_parser"
Jun 27 11:42:21 debian-pc kernel: [   10.020724] audit: type=1400
audit(1561646536.208:2): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=275 comm="apparmor_parser"
Jun 27 16:10:08 debian-pc kernel: [    9.966975] audit: type=1400
audit(1561662603.150:4): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=278 comm="apparmor_parser"
Jun 28 09:32:49 debian-pc kernel: [   10.929609] audit: type=1400
audit(1561725164.112:4): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=278 comm="apparmor_parser"
Jun 28 10:24:15 debian-pc kernel: [    9.878144] audit: type=1400
audit(1561728249.071:2): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=281 comm="apparmor_parser"
Jun 29 08:49:08 debian-pc kernel: [   10.285550] audit: type=1400
audit(1561808943.458:2): apparmor="STATUS" operation="profile_load"
profile="unconfined" name="/usr/sbin/ntpd" pid=282 comm="apparmor_parser"
Jun 29 12:04:38 debian-pc kernel: [  944.068018] audit: type=1400
audit(1561820678.188:22): apparmor="STATUS" operation="profile_replace"
profile="unconfined" name="/usr/sbin/ntpd" pid=6829 comm="apparmor_parser"
Jun 29 12:07:40 debian-pc kernel: [ 1126.048457] audit: type=1400
audit(1561820860.167:23): apparmor="STATUS" operation="profile_replace"
profile="unconfined" name="/usr/sbin/ntpd" pid=7592 comm="apparmor_parser"

ntp (1:4.2.8p12+dfsg-4) unstable; urgency=medium

 * CVE-2019-8936: Crafted null dereference attack in authenticated
   mode 6 packet (Closes: #924228)
 * ntp: exit 0 from init script if daemon does not exist (Closes: #764546)
 * Drop locking from ntp initscript/systemd-wrapper
 * Only delete ntpd statistics files in cronjob (Closes: #772790)

-- Bernhard Schmidt <be...@debian.org>  Thu, 21 Mar 2019 23:42:36 +0100

ntp (1:4.2.8p12+dfsg-3) unstable; urgency=low

 * Treat testsuite errors as non-fatal on some architectures
   Fixes FTBFS on ppc64el, ia64, powerpc, ppc64

-- Bernhard Schmidt <be...@debian.org>  Fri, 14 Sep 2018 22:31:42 +0200

ntp (1:4.2.8p12+dfsg-2) unstable; urgency=low

 * Drop ntpdate ifupdown hooks (Closes: #908286)
   These have been a constant source of problems and one-shot syncs
   are not a proper solution for timekeeping. See ntpdate.NEWS for
   details
 * Do not install /var/lib/ntpdate, not used anymore
 * Drop maintscript snippets for upgrading from versions prior to Jessie
 * Reenable unittest
   - disable always failing test-decodenetnum with a patch
 * Set Rules-Requires-Root: no

-- Bernhard Schmidt <be...@debian.org>  Thu, 13 Sep 2018 23:16:11 +0200

ntp (1:4.2.8p12+dfsg-1) unstable; urgency=medium

 [ Bernhard Schmidt ]
 * New upstream version 4.2.8p12
 * Update Maintainer address to n...@packages.debian.org (Closes: #899940)
 * Update ntpdate.8 from ntpdate.html (Closes: #476491, #515246)

 [ Peter Eisentraut ]
 * Remove Peter Eisentraut from Uploaders

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: SKS 1.1.6+
Comment: Hostname: pgp.key-server.io
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=QSf6
-----END PGP PUBLIC KEY BLOCK-----

Reply via email to