Commit Graph

  • a74a4e8524 Accepting request 1207244 from security factory Dominique Leuenberger 2024-10-14 11:06:20 +00:00
  • 239d018a6e - Update audit.spec (bsc#1231236): * add requirement for 'awk' package * move some %post logic from audit to audit-rules devel Enzo Matsumiya 2024-10-11 13:04:43 +00:00
  • 757054e43f Accepting request 1205295 from security Ana Guerrero 2024-10-03 15:59:59 +00:00
  • 1878dbbb84 - Readd audit-allow-manual-stop.patch (removed by mistake) - Fix plugin termination when using systemd service units (bsc#1215377) * add auditd.service-fix-plugin-termination.patch Enzo Matsumiya 2024-10-02 17:07:53 +00:00
  • 66d350687b Accepting request 1204507 from security Ana Guerrero 2024-09-30 13:34:55 +00:00
  • 90ef868a13 - Update audit-secondary.spec: * Add "Requires: audit-rules" for audit package * Remove preun/postun handling of audit-rules.service - Update to 4.0 - Drop python2 support - Drop auvirt and autrace programs - Drop SysVinit support - Require the use of the 5.0 or later kernel headers - New README.md file - Rewrite legacy service functions in terms of systemctl - Consolidate and update end of event detection to a common function - Split off rule loading from auditd.service into audit-rules.service - Refactor libaudit.h to split out logging functions and record numbers - Speed up aureport --summary reports - Limit libaudit python bindings to logging functions - Add a metrics function for auparse - Change auditctl to use pidfd_send_signal for signaling auditd - Adjust watches to optimize syscalls hooked when watch file access - Drop nispom rules - Add intepretations for fsconfig, fsopen, fsmount, & move_mount - Many code fixups (cgzones) - Update syscall and interpretation tables to the 6.8 kernel (from v3.1.2) - When processing a run level change, make auditd exit - In auditd, fix return code when rules added in immutable mode - In auparse, when files are given, also consider EUID for access - Auparse now interprets unnamed/anonymous sockets (Enzo Matsumiya) - Disable Python bindings from setting rules due to swig bug (S. Trofimovich) - Update all lookup tables for the 6.5 kernel - Don't be as paranoid about auditctl -R file permissions - In ausearch, correct subject/object search to be an and if both are given - Adjust formats for 64 bit time_t - Fix segfault in python bindings around the feed API - Add feed_has_data, get_record_num, and get/goto_field_num to python bindings - Update spec: * Move rules-related files into new subpackage audit-rules': * Files moved: - /sbin/auditctl, /sbin/augenrules, /etc/audit/{audit.rules,rules.d/audit.rules,audit-stop.rules} - manpages for auditctl, augenrules, and audit.rules - /etc/audit is now owned by audit-rules' as well * Add new file /usr/lib/systemd/system/audit-rules.service * Remove in-house create-augenrules-service.patch that generated augenrules.service systemd unit service * Remove ownership of /usr/share/audit * Create /usr/share/audit-rules directory on %install * Remove audit-userspace-517-compat.patch (fixed upstream) * Remove libev-werror.patch (fixed upstream) * Remove audit-allow-manual-stop.patch (fixed upstream) * Add fix-auparse-test.patch (downstream): Upstream tests uses a static value (42) for 'gdm' uid/gid (based on Fedora values, apparently). Replace these occurrences with 'unknown(123456)' * Replace '--with-python' with '--with-python3' on %configure * Remove autrace and auvirt references (upstream) * Replace README with README.md - Drop `--enable-systemd' from %configure as SysV-style scripts aren't supported in upstream since 113ae191758c ("Drop support for SysVinit") Marcus Meissner 2024-09-29 09:40:50 +00:00
  • 3f0a4c9486 reinstate %dir /etc/audit in the audit package Wolfgang Frisch 2024-09-17 14:40:04 +00:00
  • 42402f11b7 - Update to 4.0 * Includes fixes since v3.1.1 * Enhance support for newer (5.0+) kernels - Update spec: * Move rules-related files into new subpackage audit-rules': * Files moved: - /sbin/auditctl, /sbin/augenrules, /etc/audit/{audit.rules,rules.d/audit.rules,audit-stop.rules} - manpages for auditctl, augenrules, and audit.rules - /etc/audit is now owned by audit-rules' as well * Add new file /usr/lib/systemd/system/audit-rules.service * Remove in-house create-augenrules-service.patch that generated augenrules.service systemd unit service * Remove ownership of /usr/share/audit * Create /usr/share/audit-rules directory on %install * Remove audit-userspace-517-compat.patch (fixed upstream) * Remove libev-werror.patch (fixed upstream) * Remove audit-allow-manual-stop.patch (fixed upstream) * Add fix-auparse-test.patch (downstream): Upstream tests uses a static value (42) for 'gdm' uid/gid (based on Fedora values, apparently). Replace these occurrences with 'unknown(123456)' * Replace '--with-python' with '--with-python3' on %configure * Remove autrace and auvirt references (upstream) * Replace README with README.md - Drop `--enable-systemd' from %configure as SysV-style scripts aren't supported in upstream since 113ae191758c ("Drop support for SysVinit") - Update to 4.0 * Includes fixes since v3.1.1 * Enhance support for newer (5.0+) kernels - Update spec: * Add fix-auparse-test.patch (downstream): Upstream tests uses a static value (42) for 'gdm' uid/gid (based on Fedora values, apparently). Replace these occurrences with 'unknown(123456)' * Replace '--with-python' with '--with-python3' on %configure * Add new headers 'audit_logging.h' and 'audit-records.h' for audit-devel Wolfgang Frisch 2024-09-17 08:11:59 +00:00
  • ac660bee23 Accepting request 1195098 from security Ana Guerrero 2024-08-22 16:10:26 +00:00
  • af8bee2ca9 - Remove rcaudit symlink [jsc#PED-266] Enzo Matsumiya 2024-08-21 11:34:51 +00:00
  • e48664a6d7 Accepting request 1098554 from security Dominique Leuenberger 2023-07-16 15:28:32 +00:00
  • 8569642ef7 Accepting request 1097513 from home:polslinux:branches:security Enzo Matsumiya 2023-07-13 15:26:56 +00:00
  • d1358f4337 Accepting request 1096509 from home:polslinux:branches:security Wolfgang Frisch 2023-07-03 14:59:58 +00:00
  • e8c281ed5c Accepting request 1084694 from home:fcrozat:branches:security Wolfgang Frisch 2023-05-10 09:07:42 +00:00
  • 28591f1543 Accepting request 1073295 from home:gbelinassi Enzo Matsumiya 2023-03-20 19:59:00 +00:00
  • 405fcdff1b Accepting request 1066846 from home:polslinux:branches:security Wolfgang Frisch 2023-03-01 11:19:17 +00:00
  • c2d1b94dc4 Accepting request 1066163 from security Dominique Leuenberger 2023-02-19 17:18:35 +00:00
  • e33aeccfc5 clean up stale archiv and removed patches Robert Frohl 2023-02-16 11:01:07 +00:00
  • 70202c4f18 Accepting request 1051400 from home:lnussel:usrmerge Robert Frohl 2023-01-31 13:00:20 +00:00
  • 7e1b0e83b8 Accepting request 1043243 from home:ematsumiya:branches:security Enzo Matsumiya 2022-12-19 19:54:31 +00:00
  • ce952275f8 Accepting request 969466 from security Dominique Leuenberger 2022-04-17 21:49:30 +00:00
  • 4a3ef5cf8e Accepting request 969286 from home:jengelh:branches:security Marcus Meissner 2022-04-12 14:18:42 +00:00
  • dfdf560849 Accepting request 965461 from security Dominique Leuenberger 2022-03-31 15:18:30 +00:00
  • 26999f1942 Accepting request 965005 from home:coolo:branches:security Enzo Matsumiya 2022-03-28 17:51:02 +00:00
  • affdcc0b01 Accepting request 964942 from home:ematsumiya:branches:security Enzo Matsumiya 2022-03-25 20:12:53 +00:00
  • 8c6f875550 Accepting request 964336 from home:dirkmueller:Factory Enzo Matsumiya 2022-03-25 14:41:23 +00:00
  • 54f6a26404 Accepting request 934645 from security Dominique Leuenberger 2021-12-01 19:46:08 +00:00
  • c309536630 Accepting request 934558 from home:favogt:branches:security Enzo Matsumiya 2021-11-30 01:45:17 +00:00
  • 6189ef2a7d Accepting request 930227 from security Dominique Leuenberger 2021-11-12 14:58:53 +00:00
  • 4de8c602d7 Accepting request 930154 from home:gmbr3:Active Enzo Matsumiya 2021-11-08 18:23:23 +00:00
  • 830ee0e3c1 Accepting request 926074 from security Dominique Leuenberger 2021-10-20 18:22:44 +00:00
  • 483b357e07 Accepting request 925413 from home:gmbr3:Active Enzo Matsumiya 2021-10-18 18:42:45 +00:00
  • 1b5f7ae8b7 Accepting request 925195 from home:ematsumiya:branches:security Enzo Matsumiya 2021-10-13 23:13:08 +00:00
  • a584999d5c Accepting request 920362 from security Dominique Leuenberger 2021-10-01 20:28:52 +00:00
  • 3099f73ab7 Accepting request 920360 from home:ematsumiya:branches:security Enzo Matsumiya 2021-09-20 17:14:08 +00:00
  • 09b88829e8 Accepting request 920348 from home:ematsumiya:branches:security Enzo Matsumiya 2021-09-20 16:14:05 +00:00
  • aa32cfdfe2 Accepting request 912415 from security Dominique Leuenberger 2021-08-24 08:53:51 +00:00
  • 0e616b4165 - harden_auditd.service.patch: automatic hardening applied to systemd services Marcus Meissner 2021-08-16 13:36:30 +00:00
  • 127262eccc Accepting request 911452 from home:jsegitz:branches:systemdhardening:security Marcus Meissner 2021-08-16 13:21:17 +00:00
  • cdf3fa9c76 Accepting request 910030 from security Dominique Leuenberger 2021-08-07 15:57:08 +00:00
  • d083951a31 - use https source urls Marcus Meissner 2021-08-03 15:56:57 +00:00
  • ebf7ab7764 - use https source urls Marcus Meissner 2021-08-03 15:56:42 +00:00
  • 97e319769c Accepting request 909447 from home:ematsumiya:branches:security Marcus Meissner 2021-08-01 14:31:28 +00:00
  • 42d0a5fa7c Accepting request 900607 from security Dominique Leuenberger 2021-06-24 16:21:49 +00:00
  • 5810f8940b Accepting request 900606 from home:ematsumiya:branches:security Enzo Matsumiya 2021-06-17 14:59:32 +00:00
  • 51c3a9728b Accepting request 900442 from home:ematsumiya:branches:security Enzo Matsumiya 2021-06-16 18:07:14 +00:00
  • 827fffa884 Accepting request 900437 from home:ematsumiya:branches:security Enzo Matsumiya 2021-06-16 17:29:54 +00:00
  • 0ee158a589 Accepting request 900434 from home:ematsumiya:branches:security Enzo Matsumiya 2021-06-16 17:16:06 +00:00
  • 0a1e448676 Accepting request 868681 from security Dominique Leuenberger 2021-02-07 14:13:59 +00:00
  • e1db8b24d2 Accepting request 868443 from home:dimstar:Factory Marcus Meissner 2021-02-02 15:17:31 +00:00
  • d19eedf2c5 Accepting request 867563 from home:ematsumiya:branches:security Marcus Meissner 2021-01-30 08:05:50 +00:00
  • 3ef1d32d19 Accepting request 854217 from security Dominique Leuenberger 2020-12-21 09:21:49 +00:00
  • da2300c646 - Enable Aarch64 processor support. (bsc#1179515 bsc#1179806) Marcus Meissner 2020-12-09 10:00:48 +00:00
  • 0efabbed8d Accepting request 851328 from security Dominique Leuenberger 2020-12-03 17:38:06 +00:00
  • 07903acdf1 Accepting request 849560 from home:lnussel:usrmove Enzo Matsumiya 2020-11-27 13:40:00 +00:00
  • f0e0e85897 Accepting request 810662 from security Dominique Leuenberger 2020-06-11 12:38:39 +00:00
  • 005741884e - Fix specfile to require libauparse0 and libaudit1 after splitting audit-libs (bsc#1172295) Enzo Matsumiya 2020-06-01 17:13:53 +00:00
  • 9f1fdb1bed Accepting request 765091 from security Dominique Leuenberger 2020-01-23 15:07:45 +00:00
  • 74524fcb73 - Update to version 2.6.5: * Fix segfault on shutdown * Fix hang on startup (#1587995) * Add sleep to script to dump state so file is ready when needed * Add auparse_normalizer support for SOFTWARE_UPDATE event * Mark netlabel events as simple events so that get processed quicker * When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833) * Add 30-ospp-v42.rules to meet new Common Criteria requirements * Update lookup tables for the 4.18 kernel * In aureport, fix segfault in file report * Add auparse_normalizer support for labeled networking events * Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194) * Event aging is off by a second * In ausearch/auparse, correct event ordering to process oldest first * auparse_reset was not clearing everything it should * Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events * In ausearch/report, lightly parse selinux portion of USER_AVC events * In ausearch/report, limit record size when malformed * In auditd, fix extract_type function for network originating events * In auditd, calculate right size and location for network originating events * Treat all network originating events as VER2 so dispatcher doesn't format it * In audisp-remote do an initial connection attempt (#1625156) * In auditd, allow expression of space left as a percentage (#1650670) * On PPC64LE systems, only allow 64 bit rules (#1462178) * Make some parts of auditd state report optional based on config * Fix ausearch when checkpointing a single file (Burn Alting) * Fix scripting in 31-privileged.rules wrt filecap (#1662516) * In ausearch, do not checkpt if stdin is input source * In libev, remove __cold__ attribute for functions to allow proper hardening * Add tests to configure.ac for openldap support Tony Jones 2020-01-16 20:02:22 +00:00
  • 4971d594a2 osc copypac from project:security package:audit revision:105 Tony Jones 2019-10-18 17:26:13 +00:00
  • a026abd994 Accepting request 739736 from home:RBrownSUSE:branches:security Tony Jones 2019-10-17 14:14:02 +00:00
  • ea50e39101 Accepting request 708766 from security Dominique Leuenberger 2019-06-26 13:59:07 +00:00
  • c90af7d388 Accepting request 687275 from home:jengelh:sct Lars Vogdt 2019-06-08 16:58:52 +00:00
  • 59a15871f8 Accepting request 619464 from security Dominique Leuenberger 2018-07-07 19:51:47 +00:00
  • f7b3eda238 Accepting request 618655 from home:1Antoine1:branches:security Tony Jones 2018-06-28 01:17:18 +00:00
  • 6975dcd5ff Accepting request 593188 from home:kukuk:branches:security Marcus Rueckert 2018-04-11 13:58:54 +00:00
  • e5a6970bfd Accepting request 588035 from security Dominique Leuenberger 2018-03-26 09:51:53 +00:00
  • e57cf5edeb Accepting request 588034 from home:jones_tony:branches:security Tony Jones 2018-03-16 23:10:56 +00:00
  • 7176e3c394 Accepting request 580988 from openSUSE:Factory:Staging:O Tony Jones 2018-03-01 21:24:42 +00:00
  • c3b4f0e839 - reverted -j1 force ppc specific only Marcus Meissner 2018-02-22 11:00:36 +00:00
  • c2369388d3 Accepting request 573323 from home:michel_mno:branches:security Marcus Meissner 2018-02-19 07:17:33 +00:00
  • dfaa3130a1 Accepting request 567005 from security Dominique Leuenberger 2018-01-26 12:33:24 +00:00
  • b1e7f92a48 Accepting request 566726 from home:scarabeus_iv:branches:security Tony Jones 2018-01-17 21:04:11 +00:00
  • bc47e83530 Accepting request 540279 from security Dominique Leuenberger 2017-11-15 15:49:16 +00:00
  • 32adeb8614 Accepting request 540272 from home:pluskalm:branches:security Marcus Meissner 2017-11-09 17:04:53 +00:00
  • 1ded129a42 Accepting request 539420 from home:avindra Marcus Meissner 2017-11-09 13:54:55 +00:00
  • d3da0cd89a Accepting request 517818 from security Dominique Leuenberger 2017-08-24 15:40:36 +00:00
  • 757d4f4e1d Accepting request 517517 from home:dimstar:Factory Marcus Meissner 2017-08-21 05:39:17 +00:00
  • a10b7236ba Accepting request 514176 from security Yuchen Lin 2017-08-08 09:56:33 +00:00
  • f336e4b06a Accepting request 512289 from home:jengelh:branches:security Marcus Meissner 2017-08-03 08:14:13 +00:00
  • 3f83748f78 Accepting request 511711 from security Dominique Leuenberger 2017-07-24 10:29:14 +00:00
  • e3d31e63b6 Accepting request 511710 from home:jones_tony:branches:security Tony Jones 2017-07-20 20:07:48 +00:00
  • 0dd7220473 Accepting request 383796 from security Dominique Leuenberger 2016-04-11 08:27:30 +00:00
  • 8bfd2e643e Accepting request 383289 from home:scarabeus_iv:branches:security Marcus Meissner 2016-04-04 09:18:16 +00:00
  • e700ce1264 Accepting request 382986 from home:scarabeus_iv:branches:security Tony Jones 2016-04-01 16:36:15 +00:00
  • 164d09553b Accepting request 347322 from security Stephan Kulow 2015-12-13 08:34:08 +00:00
  • 23489d2c18 Accepting request 347165 from home:posophe:branches:security Marcus Meissner 2015-12-03 14:45:33 +00:00
  • 2caf2e950d Accepting request 329230 from security Dominique Leuenberger 2015-09-11 06:59:55 +00:00
  • b5e111de83 OBS-URL: https://build.opensuse.org/package/show/security/audit?expand=0&rev=79 Tony Jones 2015-09-04 22:54:46 +00:00
  • 7a17f4104f Accepting request 329223 from home:jones_tony:branches:security Tony Jones 2015-09-04 22:09:27 +00:00
  • 35ac1a5f73 Accepting request 283377 from security Tony Jones 2015-01-29 20:31:09 +00:00
  • 42d7928102 Accepting request 283367 from home:fdmanana:branches:security Tony Jones 2015-01-29 19:21:15 +00:00
  • 3fa133e1f9 Accepting request 263884 from security Dominique Leuenberger 2014-12-03 21:47:20 +00:00
  • 74ea258675 - Update to version 2.4.1 Changelog 2.4.1 - Make python3 support easier - Add support for ppc64le (Tony Jones) - Add some translations for a1 of ioctl system calls - Add command & virtualization reports to aureport - Update aureport config report for new events - Add account modification summary report to aureport - Add GRP_MGMT and GRP_CHAUTHTOK event types - Correct aureport account change reports - Add integrity event report to aureport - Add config change summary report to aureport - Adjust some syslogging level settings in audispd - Improve parsing performance in everything - When ausearch outputs a line, use the previously parsed values (Burn Alting) - Improve searching and interpreting groups in events - Fully interpret the proctitle field in auparse - Correct libaudit and auditctl support for kernel features - Add support for backlog_time_wait setting via auditctl - Update syscall tables for the 3.18 kernel - Ignore DNS failure for email validation in auditd (#1138674) - Allow rotate as action for space_left and disk_full in auditd.conf - Correct login summary report of aureport - Auditctl syscalls can be comma separated list now - Update rules for new subsystems and capabilities - Drop patch audit-add-ppc64le-mach-support.patch (already upstream) Jan Matejka 2014-11-26 16:13:05 +00:00
  • f51020c36e Accepting request 247316 from security Stephan Kulow 2014-09-07 09:11:37 +00:00
  • a550638087 Accepting request 247315 from home:jones_tony:branches:security Tony Jones 2014-09-02 23:07:21 +00:00
  • 3f8c9faf02 Accepting request 245613 from security Stephan Kulow 2014-08-25 10:59:44 +00:00
  • 42c1e24684 Accepting request 244848 from home:elvigia:branches:security Marcus Meissner 2014-08-21 13:31:20 +00:00
  • 30cb942b15 Accepting request 240712 from security Stephan Kulow 2014-07-22 04:57:45 +00:00
  • 0251e93f2b Accepting request 240711 from home:jones_tony:branches:security Tony Jones 2014-07-11 21:01:21 +00:00