Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: audit | Distribution: SUSE Linux Enterprise 15 |
Version: 3.0.6 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150400.2.4 | Build date: Sat May 7 23:23:23 2022 |
Group: System/Monitoring | Build host: sheep64 |
Size: 651039 | Source RPM: audit-secondary-3.0.6-150400.2.4.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://people.redhat.com/sgrubb/audit/ | |
Summary: User Space Tools for Kernel Auditing |
The audit package contains the user space utilities for storing and processing the audit records generated by the audit subsystem in the Linux kernel.
LGPL-2.1-or-later
* Mon Apr 11 2022 jengelh@inai.de - Drop buildrequire on C++ compiler. - Modernize specfile constructs. * Sat Mar 26 2022 coolo@suse.com - Fix buildrequire for openldap2-devel - audit doesn't require the (outdated) C++ binding, but the C headers that happen to be pulled in by buildrequiring the C++ devel package * Fri Mar 25 2022 ematsumiya@suse.com - Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645) * add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch - Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517) * add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch * Wed Mar 23 2022 dmueller@suse.com - add audit-userspace-517-compat.patch * Mon Nov 29 2021 fvogt@suse.com - Use %autosetup - Don't include sample rules as %doc, they're already installed as normal files - Fix create-augenrules-service.patch: * auditd.service needs to require augenrules.service, not the other way around - Fix documentation for enable-stop-rules.patch * Sun Nov 07 2021 gmbr3@opensuse.org - Update to version 3.0.6: * fixes a segfault on some SELINUX_ERR records * makes IPX packet interpretation dependent on the ipx header file existing * adds b32/b64 support to ausyscall * adds support for armv8l * fixes auditctl list of syscalls on PPC * auditd.service now restarts auditd under some conditions * Fri Oct 15 2021 gmbr3@opensuse.org - Add CONFIG parameter to %sysusers_generate_pre * Wed Oct 13 2021 ematsumiya@suse.com - Create separate service for augenrules (bsc#1191614, bsc#1181400) * add create-augenrules-service.patch Remove ReadWritePaths=/etc/audit from auditd.service, also removes augenrules call from ExecStartPost. Create augenrules.service with the ReadWritePaths directive above. This makes /etc/audit only accessible by augenrules.service and let auditd.service (and daemon) to be sandboxed again. - Update audit-secondary.spec to accomodate the new service file. * Mon Sep 20 2021 ematsumiya@suse.com - Fix hardened auditd.service (bsc#1181400) * add fix-hardened-service.patch Make /etc/audit read-write from the service. Remove PrivateDevices=true to expose /dev/* to auditd.service. - Enable stop rules for audit.service (cf. bsc#1190227) * add enable-stop-rules.patch * Thu Sep 16 2021 ematsumiya@suse.com - Change default log_format from ENRICHED to RAW (bsc#1190500): * add change-default-log_format.patch (SUSE-specific patch) - Update to version 3.0.5: * In auditd, flush uid/gid caches when user/group added/deleted/modified * Fixed various issues when dealing with corrupted logs * In auditd, check if log_file is valid before closing handle - Include fixed from 3.0.4: * Apply performance speedups to auparse library * Optimize rule loading in auditctl * Fix an auparse memory leak caused by glibc-2.33 by replacing realpath * Update syscall table to the 5.14 kernel * Fixed various issues when dealing with corrupted logs * Mon Aug 16 2021 meissner@suse.com - harden_auditd.service.patch: automatic hardening applied to systemd services * Fri Jul 30 2021 ematsumiya@suse.com - Update to version 3.0.3: * Dont interpret audit netlink groups unless AUDIT_NLGRP_MAX is defined * Add support for AUDIT_RESP_ORIGIN_UNBLOCK_TIMED to ids * Change auparse_feed_has_data in auparse to include incomplete events * Auditd, stop linking against -lrt * Add ProtectHome and RestrictRealtime to auditd.service * In auditd, read up to 3 netlink packets in a row * In auditd, do not validate path to plugin unless active * In auparse, only emit config errors when AUPARSE_DEBUG env variable exists - use https source urls * Mon Jun 14 2021 ematsumiya@suse.com - Adjust audit.spec and audit-secondary.spec to support new version - Include fix for libev * add libev-werror.patch - Update to version 3.0.2 - In audispd-statsd pluging, use struct sockaddr_storage (Ville Heikkinen) - Optionally interpret auid in auditctl -l - Update some syscall argument interpretations - In auditd, do not allow spaces in the hostname name format - Big documentation cleanup (MIZUTA Takeshi) - Update syscall table to the 5.12 kernel - Update the auparse normalizer for new event types - Fix compiler warnings in ids subsystem - Block a couple signals from flush & reconfigure threads - In auditd, don't wait on flush thread when exiting - Output error message if the path of input files are too long ausearch/report Included fixes from 3.0.1 - Update syscall table to the 5.11 kernel - Add new --eoe-timeout option to ausearch and aureport (Burn Alting) - Only enable periodic timers when listening on the network - Upgrade libev to 4.33 - Add auparse_new_buffer function to auparse library - Use the select libev backend unless aggregating events - Add sudoers to some base audit rules - Update the auparse normalizer for some new syscalls and event types Included fixes from 3.0 - Generate checkpoint file even when no results are returned (Burn Alting) - Fix log file creation when file logging is disabled entirely (Vlad Glagolev) - Convert auparse_test to run with python3 (Tomáš Chvátal) - Drop support for prelude - Adjust backlog_wait_time in rules to the kernel default (#1482848) - Remove ids key syntax checking of rules in auditctl - Use SIGCONT to dump auditd internal state (#1504251) - Fix parsing of virtual timestamp fields in ausearch_expression (#1515903) - Fix parsing of uid & success for ausearch - Add support for not equal operator in audit by executable (Ondrej Mosnacek) - Hide lru symbols in auparse - Add systemd process protections - Fix aureport summary time range reporting - Allow unlimited retries on startup for remote logging - Add queue_depth to remote logging stats and increase default queue_depth size - Fix segfault on shutdown - Merge auditd and audispd code - Close on execute init_pipe fd (#1587995) - Breakout audisp syslog plugin to be standalone program - Create a common internal library to reduce code - Move all audispd config files under /etc/audit/ - Move audispd.conf settings into auditd.conf - Add queue depth statistics to internal state dump report - Add network statistics to internal state dump report - SIGUSR now also restarts queue processing if its suspended - Update lookup tables for the 4.18 kernel - Add auparse_normalizer support for SOFTWARE_UPDATE event - Add 30-ospp-v42.rules to meet new Common Criteria requirements - Deprecate enable_krb and replace with transport config opt for remote logging - Mark netlabel events as simple events so that get processed quicker - When auditd is reconfiguring, only SIGHUP plugins with valid pid (#1614833) - In aureport, fix segfault in file report - Add auparse_normalizer support for labeled networking events - Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194) - In ausearch/auparse, event aging is off by a second - In ausearch/auparse, correct event ordering to process oldest first - Migrate auparse python test to python3 - auparse_reset was not clearing everything it should - Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events - In ausearch/report, lightly parse selinux portion of USER_AVC events - Add bpf syscall command argument interpretation to auparse - In ausearch/report, limit record size when malformed - Port af_unix plugin to libev - In auditd, fix extract_type function for network originating events - In auditd, calculate right size and location for network originating events - Make legacy script wait for auditd to terminate (#1643567) - Treat all network originating events as VER2 so dispatcher doesn't format it - If an event has a node name make it VER2 so dispatcher doesnt format it - In audisp-remote do an initial connection attempt (#1625156) - In auditd, allow expression of space left as a percentage (#1650670) - On PPC64LE systems, only allow 64 bit rules (#1462178) - Make some parts of auditd state report optional based on config - Update to libev-4.25 - Fix ausearch when checkpointing a single file (Burn Alting) - Fix scripting in 31-privileged.rules wrt filecap (#1662516) - In ausearch, do not checkpt if stdin is input source - In libev, remove __cold__ attribute for functions to allow proper hardening - Add tests to configure.ac for openldap support - Make systemd support files use /run rather than /var/run (Christian Hesse) - Fix minor memory leak in auditd kerberos credentials code - Allow exclude and user filter by executable name (Ondrej Mosnacek) - Fix auditd regression where keep_logs is limited by rotate_logs 2 file test - In ausearch/report fix --end to use midnight time instead of now (#1671338) - Add substitue functions for strndupa & rawmemchr - Fix memleak in auparse caused by corrected event ordering - Fix legacy reload script to reload audit rules when daemon is reloaded - Support for unescaping in trusted messages (Dmitry Voronin) - In auditd, use standard template for DEAMON events (Richard Guy Briggs) - In aureport, fix segfault for malformed USER_CMD events - Add exe field to audit_log_user_command in libaudit - In auditctl support filter on socket address families (Richard Guy Briggs) - Deprecate support for Alpha & IA64 processors - If space_left_action is rotate, allow it every time (#1718444) - In auparse, drop standalone EOE events - Add milliseconds column for ausearch extra time csv format - Fix aureport first event reporting when no start given - In audisp-remote, add new config item for startup connection errors - Remove dependency on chkconfig - Install rules to /usr/share/audit/sample-rules/ - Split up ospp rules to make SCAP scanning easier (#1746018) - In audisp-syslog, support interpreting records (#1497279) - Audit USER events now sends msg as name value pair - Add support for AUDIT_BPF event - Auditd should not process AUDIT_REPLACE events - Update syscall tables to the 5.5 kernel - Improve personality interpretation by using PERS_MASK - Speedup ausearch/report parsing RAW logging format by caching uid/name lookup - Change auparse python bindings to shared object (Issue #121) - Add error messages for watch permissions - If audit rules file doesn't exist log error message instead of info message - Revise error message for unmatched options in auditctl - In audisp-remote, fixup remote endpoint disappearin in ascii format - Add backlog_wait_time_actual reporting / resetting to auditctl (Max Englander) - In auditctl, add support for sending a signal to auditd - Removes audit-fno-common.patch: fixed in upstream - Removes audit-python3.patch: fixed in upstream * Mon Feb 01 2021 dimstar@opensuse.org - Do not explicitly provide group(audit) in system-users-audit: this is automatically handled by rpm/providers. * Thu Jan 28 2021 ematsumiya@suse.com - Create new "audit" group for read access to logs (bsc#1178154) * add change-default-log_group.patch * update audit-secondary.spec * Wed Dec 02 2020 abergmann@suse.com - Enable Aarch64 processor support. (bsc#1179515 bsc#1179806) * Fri Oct 16 2020 lnussel@suse.de - prepare usrmerge (boo#1029961) * Mon Jan 13 2020 tonyj@suse.com - Update to version 2.8.5: * Fix segfault on shutdown * Fix hang on startup (#1587995) * Add sleep to script to dump state so file is ready when needed * Add auparse_normalizer support for SOFTWARE_UPDATE event * Mark netlabel events as simple events so that get processed quicker * When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833) * Add 30-ospp-v42.rules to meet new Common Criteria requirements * Update lookup tables for the 4.18 kernel * In aureport, fix segfault in file report * Add auparse_normalizer support for labeled networking events * Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194) * Event aging is off by a second * In ausearch/auparse, correct event ordering to process oldest first * auparse_reset was not clearing everything it should * Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events * In ausearch/report, lightly parse selinux portion of USER_AVC events * In ausearch/report, limit record size when malformed * In auditd, fix extract_type function for network originating events * In auditd, calculate right size and location for network originating events * Treat all network originating events as VER2 so dispatcher doesn't format it * In audisp-remote do an initial connection attempt (#1625156) * In auditd, allow expression of space left as a percentage (#1650670) * On PPC64LE systems, only allow 64 bit rules (#1462178) * Make some parts of auditd state report optional based on config * Fix ausearch when checkpointing a single file (Burn Alting) * Fix scripting in 31-privileged.rules wrt filecap (#1662516) * In ausearch, do not checkpt if stdin is input source * In libev, remove __cold__ attribute for functions to allow proper hardening * Add tests to configure.ac for openldap support * Make systemd support files use /run rather than /var/run (Christian Hesse) * Fix minor memory leak in auditd kerberos credentials code * Fix auditd regression where keep_logs is limited by rotate_logs 2 file test * In ausearch/report fix --end to use midnight time instead of now (#1671338) - Fix build errors when using gcc-10 no-common default (bsc#1160384) New patch: audit-fno-common.patch - Refresh audit-allow-manual-stop.patch * Thu Mar 21 2019 jengelh@inai.de - Reduce scriptlets' hard dependency on systemd. * Sat Jun 23 2018 antoine.belvire@opensuse.org - Update to version 2.8.4: * Generate checkpoint file even when not results are returned (Burn Alting). * Fix log file creation when file logging is disabled entirely (Vlad Glagolev). * Use SIGCONT to dump auditd internal state (rh#1504251). * Fix parsing of virtual timestamp fields in ausearch_expression (rh#1515903). * Fix parsing of uid & success for ausearch. * Hide lru symbols in auparse. * Fix aureport summary time range reporting. * Allow unlimited retries on startup for remote logging. * Add queue_depth to remote logging stats and increase default queue_depth size. * Sun Jun 17 2018 antoine.belvire@opensuse.org - Update to version 2.8.3: * Correct msg function name in lru debug code. * Fix a segfault in auditd when dns resolution isn't available. * Make a reload legacy service for auditd. * In auparse python bindings, expose some new types that were missing. * In normalizer, pickup subject kind for user_login events. * Fix interpretation of unknown ioctcmds (rh#1540507). * Add ANOM_LOGIN_SERVICE, RESP_ORIGIN_BLOCK, & RESP_ORIGIN_BLOCK_TIMED events. * In auparse_normalize for USER_LOGIN events, map acct for subj_kind. * Fix logging of IPv6 addresses in DAEMON_ACCEPT events (rh#1534748). * Do not rotate auditd logs when num_logs < 2 (brozs). * Tue Apr 03 2018 kukuk@suse.de - Use %license instead of %doc [bsc#1082318] * Fri Mar 16 2018 tonyj@suse.com - Change openldap dependency to client only (bsc#1085003) - Resolve issue with previous change if both Python2 and Python3 are present, tests were failing as python2 bindings are preferred in this case. * Thu Feb 22 2018 meissner@suse.com - reverted -j1 force ppc specific only * Wed Feb 07 2018 tchvatal@suse.com - Add patch to fix test run without python2 interpreter: * audit-python3.patch - Update to 2.8.2 release: * Update tables for 4.14 kernel * Fixup ipv6 server side binding * AVC report from aureport was missing result column header (#1511606) * Add SOFTWARE_UPDATE event * In ausearch/report pickup any path and new-disk fields as a file * Fix value returned by auditctl --reset-lost (Richard Guy Briggs) * In auparse, fix expr_create_timestamp_comparison_ex to be numeric field * Fix building on old systems without linux/fanotify.h * Fix shell portability issues reported by shellcheck * Auditd validate_email should not use gethostbyname * Tue Feb 06 2018 normand@linux.vnet.ibm.com - force -j1 for PowerPC make check to avoid build failure (lookup_test.o: file not recognized: File truncated) * Wed Jan 17 2018 tchvatal@suse.com - Add conditions around python plugins to allow us to conditionalize them in enviroment without python2 * Thu Nov 09 2017 mpluskal@suse.com - Rename python binding packages to match current python packaging standards - Update python build dependencies to resolve future split of python2/3 * Sat Nov 04 2017 aavindraa@gmail.com - Update to version 2.8.1. See audit.spec (libaudit1) for upstream changelog - Remove audit-implicit-writev.patch (fixed upstream across 2 commits) * 3b30db20ad983274989ce9a522120c3c225436b3 * 07132c22314e9abbe64d1031fd8734243285bb3f - Cleanup with spec-cleaner * Fri Aug 18 2017 dimstar@opensuse.org - Add audit-implicit-writev.patch: include sys/uio.h to ensure readv and writev are declared. * Mon Jul 24 2017 jengelh@inai.de - Rectify RPM groups, diversify descriptions. - Remove mentions of static libraries because they are not built. * Tue Jul 18 2017 tonyj@suse.com - Update to version 2.7.7. See audit.spec (libaudit1) for upstream changelog Since commit 6cf57d27 (2.7.4) audit is now started as an non-forking service (bsc#1042781). Add config: audit-stop.rules Refresh patch: audit-allow-manual-stop.patch Refresh patch: audit-no-gss.patch * Fri Apr 01 2016 tchvatal@suse.com - Version update to 2.5. See audit.spec (libaudit1) for upstream changelog - Cleanup with spec-cleaner - Sort out bit /sbin /usr/sbin/ installation - Install the rules as documentation - Remove needless %py_requires from python subpkgs * Fri Aug 21 2015 tonyj@suse.com - Update to version 2.4.4. See audit.spec (libaudit1) for upstream changelog - Add python3 bindings for libaudit and libauparse - Remove patch 'audit-no_m4_dir.patch' (added Fri Apr 26 11:14:39 UTC 2013 by mmeister@suse.com) No idea what earlier 'automake' build error this was trying to fix but it broke the handling of "--without-libcap-ng". Anyways, no build error occurs now and m4 path is also needed in v2.4.4 to find ax_prog_cc_for_build
/etc/audit /etc/audit.rules /etc/audit/audit-stop.rules /etc/audit/auditd.conf /etc/audit/plugins.d /etc/audit/plugins.d/af_unix.conf /etc/audit/plugins.d/syslog.conf /etc/audit/rules.d /etc/audit/rules.d/audit.rules /etc/auditd.conf /sbin/auditctl /sbin/auditd /sbin/augenrules /sbin/aureport /sbin/ausearch /sbin/autrace /usr/bin/aulast /usr/bin/aulastlog /usr/bin/ausyscall /usr/bin/auvirt /usr/lib/systemd/system/auditd.service /usr/lib/systemd/system/augenrules.service /usr/sbin/audisp-syslog /usr/sbin/auditctl /usr/sbin/auditd /usr/sbin/augenrules /usr/sbin/aureport /usr/sbin/ausearch /usr/sbin/autrace /usr/sbin/rcauditd /usr/share/audit /usr/share/audit/sample-rules /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/10-no-audit.rules /usr/share/audit/sample-rules/11-loginuid.rules /usr/share/audit/sample-rules/12-cont-fail.rules /usr/share/audit/sample-rules/12-ignore-error.rules /usr/share/audit/sample-rules/20-dont-audit.rules /usr/share/audit/sample-rules/21-no32bit.rules /usr/share/audit/sample-rules/22-ignore-chrony.rules /usr/share/audit/sample-rules/23-ignore-filesystems.rules /usr/share/audit/sample-rules/30-nispom.rules /usr/share/audit/sample-rules/30-ospp-v42-1-create-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-1-create-success.rules /usr/share/audit/sample-rules/30-ospp-v42-2-modify-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-2-modify-success.rules /usr/share/audit/sample-rules/30-ospp-v42-3-access-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-3-access-success.rules /usr/share/audit/sample-rules/30-ospp-v42-4-delete-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-4-delete-success.rules /usr/share/audit/sample-rules/30-ospp-v42-5-perm-change-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-5-perm-change-success.rules /usr/share/audit/sample-rules/30-ospp-v42-6-owner-change-failed.rules /usr/share/audit/sample-rules/30-ospp-v42-6-owner-change-success.rules /usr/share/audit/sample-rules/30-ospp-v42.rules /usr/share/audit/sample-rules/30-pci-dss-v31.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/32-power-abuse.rules /usr/share/audit/sample-rules/40-local.rules /usr/share/audit/sample-rules/41-containers.rules /usr/share/audit/sample-rules/42-injection.rules /usr/share/audit/sample-rules/43-module-load.rules /usr/share/audit/sample-rules/44-installers.rules /usr/share/audit/sample-rules/70-einval.rules /usr/share/audit/sample-rules/71-networking.rules /usr/share/audit/sample-rules/99-finalize.rules /usr/share/audit/sample-rules/README-rules /usr/share/doc/packages/audit /usr/share/doc/packages/audit/ChangeLog /usr/share/doc/packages/audit/README /usr/share/doc/packages/audit/auditd.cron /usr/share/licenses/audit /usr/share/licenses/audit/COPYING /usr/share/man/man5/auditd.conf.5.gz /usr/share/man/man5/ausearch-expression.5.gz /usr/share/man/man7/audit.rules.7.gz /usr/share/man/man8/auditctl.8.gz /usr/share/man/man8/auditd.8.gz /usr/share/man/man8/augenrules.8.gz /usr/share/man/man8/aulast.8.gz /usr/share/man/man8/aulastlog.8.gz /usr/share/man/man8/aureport.8.gz /usr/share/man/man8/ausearch.8.gz /usr/share/man/man8/ausyscall.8.gz /usr/share/man/man8/autrace.8.gz /usr/share/man/man8/auvirt.8.gz /var/log/audit /var/log/audit/audit.log /var/spool/audit
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 16:00:25 2024