Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

system-group-audit-3.1.1-1.1 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: system-group-audit Distribution: openSUSE:Factory:zSystems
Version: 3.1.1 Vendor: openSUSE
Release: 1.1 Build date: Sun Jul 16 18:31:36 2023
Group: System/Fhs Build host: s390zp21
Size: 38 Source RPM: audit-secondary-3.1.1-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://people.redhat.com/sgrubb/audit/
Summary: System group 'audit'
This package contains the system group 'audit' for read access to logs.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Mon Jul 03 2023 Paolo Stivanin <info@paolostivanin.com>
  - Update to 3.1.1:
    * Add user friendly keywords for signals to auditctl
    * In ausearch, parse up URINGOP and DM_CTRL records
    * Harden auparse to better handle corrupt logs
    * Fix a CFLAGS propogation problem in the common directory
    * Move the audispd af_unix plugin to a standalone program
* Thu May 04 2023 Frederic Crozat <fcrozat@suse.com>
  - Add _multibuild to define additional spec files as additional
    flavors.
    Eliminates the need for source package links in OBS.
* Mon Feb 20 2023 Paolo Stivanin <info@paolostivanin.com>
  - Update to 3.1:
    * Disable ProtectControlGroups in auditd.service by default
    * Fix rule checking for exclude filter
    * Make audit_rule_syscallbyname_data work correctly outside of auditctl
    * Add new record types
    * Add io_uring support
    * Add support for new FANOTIFY record fields
    * Add keyword, this-hour, to ausearch/report start/end options
    * Add Requires.private to audit.pc file
    * Try to interpret OPENAT2 fields correctly
* Tue Dec 27 2022 Ludwig Nussel <lnussel@suse.com>
  - Replace transitional %usrmerged macro with regular version check (boo#1206798)
* Thu Dec 15 2022 Enzo Matsumiya <ematsumiya@suse.de>
  - Enable build for ARM (32-bit)
  - Update to version 3.0.9:
    * In auditd, release the async flush lock on stop
    * Don't allow auditd to log directly into /var/log when log_group is non-zero
    * Cleanup krb5 memory leaks on error paths
    * Update auditd.cron to use auditctl --signal
    * In auparse, if too many fields, realloc array bigger (Paul Wolneykien)
    * In auparse, special case kernel module name interpretation
    * If overflow_action is ignore, don't treat as an error
    (3.0.8)
    * Add gcc function attributes for access and allocation
    * Add some more man pages (MIZUTA Takeshi)
    * In auditd, change the reinitializing of the plugin queue
    * Fix path normalization in auparse (Sergio Correia)
    * In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya)
    * In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya)
    * Drop ProtectHome from auditd.service as it interferes with rules
    (3.0.7)
    * Add support for the OPENAT2 record type (Richard Guy Briggs)
    * In auditd, close the logging file descriptor when logging is suspended
    * Update the capabilities lookup table to match 5.16 kernel
    * Improve interpretation of renamat & faccessat family of syscalls
    * Update syscall table for the 5.16 kernel
    * Reduce dependency from initscripts to initscripts-service
  - Refresh patches (context adjusment):
    * audit-allow-manual-stop.patch
    * audit-ausearch-do-not-require-tclass.patch
    * audit-no-gss.patch
    * enable-stop-rules.patch
    * fix-hardened-service.patch
    * harden_auditd.service.patch
  - Remove patches (fixed by version update):
    * libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
    * audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
* Mon Apr 11 2022 Jan Engelhardt <jengelh@inai.de>
  - Drop buildrequire on C++ compiler.
  - Modernize specfile constructs.
* Sat Mar 26 2022 Stephan Kulow <coolo@suse.com>
  - Fix buildrequire for openldap2-devel - audit doesn't require the
    (outdated) C++ binding, but the C headers that happen to be pulled
    in by buildrequiring the C++ devel package
* Fri Mar 25 2022 Enzo Matsumiya <ematsumiya@suse.com>
  - Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645)
    * add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch
  - Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517)
    * add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch
* Wed Mar 23 2022 Dirk Müller <dmueller@suse.com>
  - add audit-userspace-517-compat.patch
* Mon Nov 29 2021 Fabian Vogt <fvogt@suse.com>
  - Use %autosetup
  - Don't include sample rules as %doc, they're already installed
    as normal files
  - Fix create-augenrules-service.patch:
    * auditd.service needs to require augenrules.service,
      not the other way around
  - Fix documentation for enable-stop-rules.patch
* Sun Nov 07 2021 Callum Farmer <gmbr3@opensuse.org>
  - Update to version 3.0.6:
    * fixes a segfault on some SELINUX_ERR records
    * makes IPX packet interpretation dependent on the ipx header
      file existing
    * adds b32/b64 support to ausyscall
    * adds support for armv8l
    * fixes auditctl list of syscalls on PPC
    * auditd.service now restarts auditd under some conditions
* Fri Oct 15 2021 Callum Farmer <gmbr3@opensuse.org>
  - Add CONFIG parameter to %sysusers_generate_pre
* Wed Oct 13 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Create separate service for augenrules (bsc#1191614, bsc#1181400)
    * add create-augenrules-service.patch
    Remove ReadWritePaths=/etc/audit from auditd.service, also removes
    augenrules call from ExecStartPost.
    Create augenrules.service with the ReadWritePaths directive above.
    This makes /etc/audit only accessible by augenrules.service and
    let auditd.service (and daemon) to be sandboxed again.
  - Update audit-secondary.spec to accomodate the new service file.
* Mon Sep 20 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Fix hardened auditd.service (bsc#1181400)
    * add fix-hardened-service.patch
      Make /etc/audit read-write from the service.
      Remove PrivateDevices=true to expose /dev/* to auditd.service.
  - Enable stop rules for audit.service (cf. bsc#1190227)
    * add enable-stop-rules.patch
* Thu Sep 16 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Change default log_format from ENRICHED to RAW (bsc#1190500):
    * add change-default-log_format.patch (SUSE-specific patch)
  - Update to version 3.0.5:
    * In auditd, flush uid/gid caches when user/group added/deleted/modified
    * Fixed various issues when dealing with corrupted logs
    * In auditd, check if log_file is valid before closing handle
  - Include fixed from 3.0.4:
    * Apply performance speedups to auparse library
    * Optimize rule loading in auditctl
    * Fix an auparse memory leak caused by glibc-2.33 by replacing realpath
    * Update syscall table to the 5.14 kernel
    * Fixed various issues when dealing with corrupted logs
* Mon Aug 16 2021 Marcus Meissner <meissner@suse.com>
  - harden_auditd.service.patch: automatic hardening applied to systemd
    services
* Fri Jul 30 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Update to version 3.0.3:
    * Dont interpret audit netlink groups unless AUDIT_NLGRP_MAX is defined
    * Add support for AUDIT_RESP_ORIGIN_UNBLOCK_TIMED to ids
    * Change auparse_feed_has_data in auparse to include incomplete events
    * Auditd, stop linking against -lrt
    * Add ProtectHome and RestrictRealtime to auditd.service
    * In auditd, read up to 3 netlink packets in a row
    * In auditd, do not validate path to plugin unless active
    * In auparse, only emit config errors when AUPARSE_DEBUG env variable exists
  - use https source urls
* Mon Jun 14 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Adjust audit.spec and audit-secondary.spec to support new version
  - Include fix for libev
    * add libev-werror.patch
  - Update to version 3.0.2
  - In audispd-statsd pluging, use struct sockaddr_storage (Ville Heikkinen)
  - Optionally interpret auid in auditctl -l
  - Update some syscall argument interpretations
  - In auditd, do not allow spaces in the hostname name format
  - Big documentation cleanup (MIZUTA Takeshi)
  - Update syscall table to the 5.12 kernel
  - Update the auparse normalizer for new event types
  - Fix compiler warnings in ids subsystem
  - Block a couple signals from flush & reconfigure threads
  - In auditd, don't wait on flush thread when exiting
  - Output error message if the path of input files are too long ausearch/report
    Included fixes from 3.0.1
  - Update syscall table to the 5.11 kernel
  - Add new --eoe-timeout option to ausearch and aureport (Burn Alting)
  - Only enable periodic timers when listening on the network
  - Upgrade libev to 4.33
  - Add auparse_new_buffer function to auparse library
  - Use the select libev backend unless aggregating events
  - Add sudoers to some base audit rules
  - Update the auparse normalizer for some new syscalls and event types
    Included fixes from 3.0
  - Generate checkpoint file even when no results are returned (Burn Alting)
  - Fix log file creation when file logging is disabled entirely (Vlad Glagolev)
  - Convert auparse_test to run with python3 (Tomáš Chvátal)
  - Drop support for prelude
  - Adjust backlog_wait_time in rules to the kernel default (#1482848)
  - Remove ids key syntax checking of rules in auditctl
  - Use SIGCONT to dump auditd internal state (#1504251)
  - Fix parsing of virtual timestamp fields in ausearch_expression (#1515903)
  - Fix parsing of uid & success for ausearch
  - Add support for not equal operator in audit by executable (Ondrej Mosnacek)
  - Hide lru symbols in auparse
  - Add systemd process protections
  - Fix aureport summary time range reporting
  - Allow unlimited retries on startup for remote logging
  - Add queue_depth to remote logging stats and increase default queue_depth size
  - Fix segfault on shutdown
  - Merge auditd and audispd code
  - Close on execute init_pipe fd (#1587995)
  - Breakout audisp syslog plugin to be standalone program
  - Create a common internal library to reduce code
  - Move all audispd config files under /etc/audit/
  - Move audispd.conf settings into auditd.conf
  - Add queue depth statistics to internal state dump report
  - Add network statistics to internal state dump report
  - SIGUSR now also restarts queue processing if its suspended
  - Update lookup tables for the 4.18 kernel
  - Add auparse_normalizer support for SOFTWARE_UPDATE event
  - Add 30-ospp-v42.rules to meet new Common Criteria requirements
  - Deprecate enable_krb and replace with transport config opt for remote logging
  - Mark netlabel events as simple events so that get processed quicker
  - When auditd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
  - In aureport, fix segfault in file report
  - Add auparse_normalizer support for labeled networking events
  - Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
  - In ausearch/auparse, event aging is off by a second
  - In ausearch/auparse, correct event ordering to process oldest first
  - Migrate auparse python test to python3
  - auparse_reset was not clearing everything it should
  - Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
  - In ausearch/report, lightly parse selinux portion of USER_AVC events
  - Add bpf syscall command argument interpretation to auparse
  - In ausearch/report, limit record size when malformed
  - Port af_unix plugin to libev
  - In auditd, fix extract_type function for network originating events
  - In auditd, calculate right size and location for network originating events
  - Make legacy script wait for auditd to terminate (#1643567)
  - Treat all network originating events as VER2 so dispatcher doesn't format it
  - If an event has a node name make it VER2 so dispatcher doesnt format it
  - In audisp-remote do an initial connection attempt (#1625156)
  - In auditd, allow expression of space left as a percentage (#1650670)
  - On PPC64LE systems, only allow 64 bit rules (#1462178)
  - Make some parts of auditd state report optional based on config
  - Update to libev-4.25
  - Fix ausearch when checkpointing a single file (Burn Alting)
  - Fix scripting in 31-privileged.rules wrt filecap (#1662516)
  - In ausearch, do not checkpt if stdin is input source
  - In libev, remove __cold__ attribute for functions to allow proper hardening
  - Add tests to configure.ac for openldap support
  - Make systemd support files use /run rather than /var/run (Christian Hesse)
  - Fix minor memory leak in auditd kerberos credentials code
  - Allow exclude and user filter by executable name (Ondrej Mosnacek)
  - Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
  - In ausearch/report fix --end to use midnight time instead of now (#1671338)
  - Add substitue functions for strndupa & rawmemchr
  - Fix memleak in auparse caused by corrected event ordering
  - Fix legacy reload script to reload audit rules when daemon is reloaded
  - Support for unescaping in trusted messages (Dmitry Voronin)
  - In auditd, use standard template for DEAMON events (Richard Guy Briggs)
  - In aureport, fix segfault for malformed USER_CMD events
  - Add exe field to audit_log_user_command in libaudit
  - In auditctl support filter on socket address families (Richard Guy Briggs)
  - Deprecate support for Alpha & IA64 processors
  - If space_left_action is rotate, allow it every time (#1718444)
  - In auparse, drop standalone EOE events
  - Add milliseconds column for ausearch extra time csv format
  - Fix aureport first event reporting when no start given
  - In audisp-remote, add new config item for startup connection errors
  - Remove dependency on chkconfig
  - Install rules to /usr/share/audit/sample-rules/
  - Split up ospp rules to make SCAP scanning easier (#1746018)
  - In audisp-syslog, support interpreting records (#1497279)
  - Audit USER events now sends msg as name value pair
  - Add support for AUDIT_BPF event
  - Auditd should not process AUDIT_REPLACE events
  - Update syscall tables to the 5.5 kernel
  - Improve personality interpretation by using PERS_MASK
  - Speedup ausearch/report parsing RAW logging format by caching uid/name lookup
  - Change auparse python bindings to shared object (Issue #121)
  - Add error messages for watch permissions
  - If audit rules file doesn't exist log error message instead of info message
  - Revise error message for unmatched options in auditctl
  - In audisp-remote, fixup remote endpoint disappearin in ascii format
  - Add backlog_wait_time_actual reporting / resetting to auditctl (Max Englander)
  - In auditctl, add support for sending a signal to auditd
  - Removes audit-fno-common.patch: fixed in upstream
  - Removes audit-python3.patch: fixed in upstream
* Mon Feb 01 2021 Dominique Leuenberger <dimstar@opensuse.org>
  - Do not explicitly provide group(audit) in system-users-audit:
    this is automatically handled by rpm/providers.
* Thu Jan 28 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Create new "audit" group for read access to logs (bsc#1178154)
    * add change-default-log_group.patch
    * update audit-secondary.spec
* Wed Dec 02 2020 Alexander Bergmann <abergmann@suse.com>
  - Enable Aarch64 processor support. (bsc#1179515 bsc#1179806)
* Fri Oct 16 2020 Ludwig Nussel <lnussel@suse.de>
  - prepare usrmerge (boo#1029961)
* Mon Jan 13 2020 Tony Jones <tonyj@suse.com>
  - Update to version 2.8.5:
    * Fix segfault on shutdown
    * Fix hang on startup (#1587995)
    * Add sleep to script to dump state so file is ready when needed
    * Add auparse_normalizer support for SOFTWARE_UPDATE event
    * Mark netlabel events as simple events so that get processed quicker
    * When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833)
    * Add 30-ospp-v42.rules to meet new Common Criteria requirements
    * Update lookup tables for the 4.18 kernel
    * In aureport, fix segfault in file report
    * Add auparse_normalizer support for labeled networking events
    * Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194)
    * Event aging is off by a second
    * In ausearch/auparse, correct event ordering to process oldest first
    * auparse_reset was not clearing everything it should
    * Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events
    * In ausearch/report, lightly parse selinux portion of USER_AVC events
    * In ausearch/report, limit record size when malformed
    * In auditd, fix extract_type function for network originating events
    * In auditd, calculate right size and location for network originating events
    * Treat all network originating events as VER2 so dispatcher doesn't format it
    * In audisp-remote do an initial connection attempt (#1625156)
    * In auditd, allow expression of space left as a percentage (#1650670)
    * On PPC64LE systems, only allow 64 bit rules (#1462178)
    * Make some parts of auditd state report optional based on config
    * Fix ausearch when checkpointing a single file (Burn Alting)
    * Fix scripting in 31-privileged.rules wrt filecap (#1662516)
    * In ausearch, do not checkpt if stdin is input source
    * In libev, remove __cold__ attribute for functions to allow proper hardening
    * Add tests to configure.ac for openldap support
    * Make systemd support files use /run rather than /var/run (Christian Hesse)
    * Fix minor memory leak in auditd kerberos credentials code
    * Fix auditd regression where keep_logs is limited by rotate_logs 2 file test
    * In ausearch/report fix --end to use midnight time instead of now (#1671338)
  - Fix build errors when using gcc-10 no-common default (bsc#1160384)
    New patch: audit-fno-common.patch
  - Refresh audit-allow-manual-stop.patch

Files

/usr/lib/sysusers.d/system-group-audit.conf


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 12:50:11 2024