Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package audit for openSUSE:Factory checked in at 2023-02-19 18:18:35 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/audit (Old) and /work/SRC/openSUSE:Factory/.audit.new.22824 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "audit" Sun Feb 19 18:18:35 2023 rev:103 rq:1066163 version:3.0.9 Changes: -------- --- /work/SRC/openSUSE:Factory/audit/audit-secondary.changes 2022-04-17 23:49:31.046280509 +0200 +++ /work/SRC/openSUSE:Factory/.audit.new.22824/audit-secondary.changes 2023-02-19 18:18:38.521359057 +0100 @@ -1,0 +2,43 @@ +Tue Dec 27 10:21:56 UTC 2022 - Ludwig Nussel <lnus...@suse.com> + +- Replace transitional %usrmerged macro with regular version check (boo#1206798) + +------------------------------------------------------------------- +Thu Dec 15 19:17:35 UTC 2022 - Enzo Matsumiya <ematsum...@suse.de> + +- Enable build for ARM (32-bit) +- Update to version 3.0.9: + * In auditd, release the async flush lock on stop + * Don't allow auditd to log directly into /var/log when log_group is non-zero + * Cleanup krb5 memory leaks on error paths + * Update auditd.cron to use auditctl --signal + * In auparse, if too many fields, realloc array bigger (Paul Wolneykien) + * In auparse, special case kernel module name interpretation + * If overflow_action is ignore, don't treat as an error + (3.0.8) + * Add gcc function attributes for access and allocation + * Add some more man pages (MIZUTA Takeshi) + * In auditd, change the reinitializing of the plugin queue + * Fix path normalization in auparse (Sergio Correia) + * In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya) + * In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya) + * Drop ProtectHome from auditd.service as it interferes with rules + (3.0.7) + * Add support for the OPENAT2 record type (Richard Guy Briggs) + * In auditd, close the logging file descriptor when logging is suspended + * Update the capabilities lookup table to match 5.16 kernel + * Improve interpretation of renamat & faccessat family of syscalls + * Update syscall table for the 5.16 kernel + * Reduce dependency from initscripts to initscripts-service +- Refresh patches (context adjusment): + * audit-allow-manual-stop.patch + * audit-ausearch-do-not-require-tclass.patch + * audit-no-gss.patch + * enable-stop-rules.patch + * fix-hardened-service.patch + * harden_auditd.service.patch +- Remove patches (fixed by version update): + * libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch + * audisp-remote-fix-hang-with-disk_low_action-suspend-.patch + +------------------------------------------------------------------- --- /work/SRC/openSUSE:Factory/audit/audit.changes 2022-04-17 23:49:31.150280651 +0200 +++ /work/SRC/openSUSE:Factory/.audit.new.22824/audit.changes 2023-02-19 18:18:38.617359667 +0100 @@ -1,0 +2,38 @@ +Thu Dec 15 19:17:35 UTC 2022 - Enzo Matsumiya <ematsum...@suse.de> + +- Enable build for ARM (32-bit) +- Update to version 3.0.9: + * In auditd, release the async flush lock on stop + * Don't allow auditd to log directly into /var/log when log_group is non-zero + * Cleanup krb5 memory leaks on error paths + * Update auditd.cron to use auditctl --signal + * In auparse, if too many fields, realloc array bigger (Paul Wolneykien) + * In auparse, special case kernel module name interpretation + * If overflow_action is ignore, don't treat as an error + (3.0.8) + * Add gcc function attributes for access and allocation + * Add some more man pages (MIZUTA Takeshi) + * In auditd, change the reinitializing of the plugin queue + * Fix path normalization in auparse (Sergio Correia) + * In libaudit, handle ECONNREFUSED for network uid/gid lookups (Enzo Matsumiya) + * In audisp-remote, fix hang with disk_low_action=suspend (Enzo Matsumiya) + * Drop ProtectHome from auditd.service as it interferes with rules + (3.0.7) + * Add support for the OPENAT2 record type (Richard Guy Briggs) + * In auditd, close the logging file descriptor when logging is suspended + * Update the capabilities lookup table to match 5.16 kernel + * Improve interpretation of renamat & faccessat family of syscalls + * Update syscall table for the 5.16 kernel + * Reduce dependency from initscripts to initscripts-service +- Refresh patches (context adjusment): + * audit-allow-manual-stop.patch + * audit-ausearch-do-not-require-tclass.patch + * audit-no-gss.patch + * enable-stop-rules.patch + * fix-hardened-service.patch + * harden_auditd.service.patch +- Remove patches (fixed by version update): + * libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch + * audisp-remote-fix-hang-with-disk_low_action-suspend-.patch + +------------------------------------------------------------------- @@ -1016 +1053,0 @@ -------------------------------------------------------------------- @@ -1017,0 +1055 @@ +------------------------------------------------------------------- Old: ---- audisp-remote-fix-hang-with-disk_low_action-suspend-.patch audit-3.0.6.tar.gz libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch New: ---- audit-3.0.9.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ audit-secondary.spec ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.353364344 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.357364369 +0100 @@ -1,7 +1,7 @@ # # spec file for package audit-secondary # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2023 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -22,7 +22,7 @@ # The seperation is required to minimize unnecessary build cycles. %define _name audit Name: audit-secondary -Version: 3.0.6 +Version: 3.0.9 Release: 0 Summary: Linux kernel audit subsystem utilities License: GPL-2.0-or-later @@ -42,8 +42,6 @@ Patch10: enable-stop-rules.patch Patch11: create-augenrules-service.patch Patch12: audit-userspace-517-compat.patch -Patch13: audisp-remote-fix-hang-with-disk_low_action-suspend-.patch -Patch14: libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch BuildRequires: audit-devel = %{version} BuildRequires: autoconf >= 2.12 BuildRequires: kernel-headers >= 2.6.30 @@ -147,6 +145,9 @@ %ifarch aarch64 --with-aarch64 \ %endif +%ifarch arm + --with-arm \ +%endif --enable-systemd \ --libexecdir=%{_libexecdir}/%{_name} \ --with-apparmor \ @@ -198,7 +199,7 @@ rm -rf %{buildroot}/%{_mandir}/man3 # Cleanup plugins #USR-MERGE -%if !0%{?usrmerged} +%if 0%{?suse_version} < 1550 mkdir %{buildroot}/sbin/ for prog in auditctl auditd ausearch autrace aureport augenrules; do ln -s %{_sbindir}/$prog %{buildroot}/sbin/$prog @@ -257,7 +258,7 @@ %attr(644,root,root) %{_mandir}/man5/ausearch-expression.5.gz %attr(644,root,root) %{_mandir}/man8/auvirt.8.gz %attr(644,root,root) %{_mandir}/man8/augenrules.8.gz -%if !0%{?usrmerged} +%if 0%{?suse_version} < 1550 /sbin/auditctl /sbin/auditd /sbin/ausearch ++++++ audit.spec ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.381364522 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.385364547 +0100 @@ -1,7 +1,7 @@ # # spec file for package audit # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2023 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: audit -Version: 3.0.6 +Version: 3.0.9 Release: 0 Summary: Linux kernel audit subsystem utilities License: GPL-2.0-or-later @@ -86,6 +86,9 @@ %ifarch aarch64 --with-aarch64 \ %endif +%ifarch arm + --with-arm \ +%endif --enable-systemd \ --libexecdir=%{_libexecdir}/%{name} \ --with-apparmor \ ++++++ audit-3.0.6.tar.gz -> audit-3.0.9.tar.gz ++++++ ++++ 29741 lines of diff (skipped) ++++++ audit-allow-manual-stop.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.657366276 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.661366301 +0100 @@ -11,14 +11,16 @@ init.d/auditd.service | 1 - 1 file changed, 1 deletion(-) ---- a/init.d/auditd.service -+++ b/init.d/auditd.service -@@ -11,7 +11,6 @@ +Index: audit-3.0.9/init.d/auditd.service +=================================================================== +--- audit-3.0.9.orig/init.d/auditd.service ++++ audit-3.0.9/init.d/auditd.service +@@ -11,7 +11,6 @@ After=local-fs.target systemd-tmpfiles-s Before=sysinit.target shutdown.target ##Before=shutdown.target Conflicts=shutdown.target -RefuseManualStop=yes ConditionKernelCommandLine=!audit=0 - Documentation=man:auditd(8) https://github.com/linux-audit/audit-documentation + ConditionKernelCommandLine=!audit=off ++++++ audit-ausearch-do-not-require-tclass.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.673366377 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.677366402 +0100 @@ -9,9 +9,11 @@ src/ausearch-parse.c | 18 ++++++++---------- 1 file changed, 8 insertions(+), 10 deletions(-) ---- a/src/ausearch-parse.c -+++ b/src/ausearch-parse.c -@@ -2061,17 +2061,15 @@ other_avc: +Index: audit-3.0.9/src/ausearch-parse.c +=================================================================== +--- audit-3.0.9.orig/src/ausearch-parse.c ++++ audit-3.0.9/src/ausearch-parse.c +@@ -2062,17 +2062,15 @@ other_avc: // Now get the class...its at the end, so we do things different str = strstr(term, "tclass="); ++++++ audit-no-gss.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.685366453 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.689366479 +0100 @@ -9,8 +9,10 @@ init.d/auditd.conf | 3 --- 1 file changed, 3 deletions(-) ---- a/init.d/auditd.conf -+++ b/init.d/auditd.conf +Index: audit-3.0.9/init.d/auditd.conf +=================================================================== +--- audit-3.0.9.orig/init.d/auditd.conf ++++ audit-3.0.9/init.d/auditd.conf @@ -30,8 +30,6 @@ tcp_max_per_addr = 1 ##tcp_client_ports = 1024-65535 tcp_client_max_idle = 0 @@ -18,6 +20,6 @@ -krb5_principal = auditd -##krb5_key_file = /etc/audit/audit.key distribute_network = no - q_depth = 1200 + q_depth = 2000 overflow_action = SYSLOG ++++++ create-augenrules-service.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.729366733 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.729366733 +0100 @@ -1,7 +1,7 @@ -Index: audit-3.0.6/init.d/augenrules.service +Index: audit-3.0.9/init.d/augenrules.service =================================================================== --- /dev/null -+++ audit-3.0.6/init.d/augenrules.service ++++ audit-3.0.9/init.d/augenrules.service @@ -0,0 +1,29 @@ +[Unit] +Description=auditd rules generation @@ -32,13 +32,13 @@ +ProtectKernelTunables=true +ProtectKernelLogs=true +ReadWritePaths=/etc/audit -Index: audit-3.0.6/init.d/auditd.service +Index: audit-3.0.9/init.d/auditd.service =================================================================== ---- audit-3.0.6.orig/init.d/auditd.service -+++ audit-3.0.6/init.d/auditd.service -@@ -13,15 +13,16 @@ Before=sysinit.target shutdown.target - Conflicts=shutdown.target - ConditionKernelCommandLine=!audit=0 +--- audit-3.0.9.orig/init.d/auditd.service ++++ audit-3.0.9/init.d/auditd.service +@@ -15,15 +15,16 @@ ConditionKernelCommandLine=!audit=0 + ConditionKernelCommandLine=!audit=off + Documentation=man:auditd(8) https://github.com/linux-audit/audit-documentation +Requires=augenrules.service +# This unit clears rules on stop, so make sure that augenrules runs again @@ -57,7 +57,7 @@ #ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules # By default we clear the rules on exit. To disable this, comment # the next line after copying the file to /etc/systemd/system/auditd.service -@@ -45,7 +46,6 @@ ProtectClock=true +@@ -46,7 +47,6 @@ ProtectClock=true ProtectKernelTunables=true ProtectKernelLogs=true # end of automatic additions @@ -65,28 +65,29 @@ [Install] WantedBy=multi-user.target -Index: audit-3.0.6/init.d/Makefile.am +Index: audit-3.0.9/init.d/Makefile.am =================================================================== ---- audit-3.0.6.orig/init.d/Makefile.am -+++ audit-3.0.6/init.d/Makefile.am -@@ -26,7 +26,7 @@ EXTRA_DIST = auditd.init auditd.service +--- audit-3.0.9.orig/init.d/Makefile.am ++++ audit-3.0.9/init.d/Makefile.am +@@ -26,7 +26,8 @@ EXTRA_DIST = auditd.init auditd.service auditd.cron libaudit.conf auditd.condrestart \ auditd.reload auditd.restart auditd.resume \ auditd.rotate auditd.state auditd.stop \ -- audit-stop.rules augenrules -+ audit-stop.rules augenrules augenrules.service +- audit-stop.rules augenrules audit-functions ++ audit-stop.rules augenrules audit-functions \ ++ augenrules.service libconfig = libaudit.conf if ENABLE_SYSTEMD initdir = /usr/lib/systemd/system -@@ -53,6 +53,7 @@ if ENABLE_SYSTEMD - mkdir -p ${DESTDIR}${initdir} +@@ -54,6 +55,7 @@ if ENABLE_SYSTEMD mkdir -p ${DESTDIR}${legacydir} + mkdir -p ${DESTDIR}${libexecdir} $(INSTALL_SCRIPT) -D -m 644 ${srcdir}/auditd.service ${DESTDIR}${initdir} + $(INSTALL_SCRIPT) -D -m 644 ${srcdir}/augenrules.service ${DESTDIR}${initdir} $(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.rotate ${DESTDIR}${legacydir}/rotate $(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.resume ${DESTDIR}${legacydir}/resume $(INSTALL_SCRIPT) -D -m 750 ${srcdir}/auditd.reload ${DESTDIR}${legacydir}/reload -@@ -70,6 +71,7 @@ uninstall-hook: +@@ -72,6 +74,7 @@ uninstall-hook: rm ${DESTDIR}${sysconfdir}/${libconfig} if ENABLE_SYSTEMD rm ${DESTDIR}${initdir}/auditd.service ++++++ enable-stop-rules.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.741366809 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.745366834 +0100 @@ -11,11 +11,11 @@ Signed-off-by: Enzo Matsumiya <ematsum...@suse.de> -Index: audit-3.0.6/init.d/auditd.service +Index: audit-3.0.9/init.d/auditd.service =================================================================== ---- audit-3.0.6.orig/init.d/auditd.service -+++ audit-3.0.6/init.d/auditd.service -@@ -23,9 +23,9 @@ ExecStart=/sbin/auditd +--- audit-3.0.9.orig/init.d/auditd.service ++++ audit-3.0.9/init.d/auditd.service +@@ -25,9 +25,9 @@ ExecStart=/sbin/auditd ## NOTE: augenrules expect any rules to be added to /etc/audit/rules.d/ ExecStartPost=-/sbin/augenrules --load #ExecStartPost=-/sbin/auditctl -R /etc/audit/audit.rules ++++++ fix-hardened-service.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.757366911 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.761366936 +0100 @@ -12,9 +12,11 @@ Signed-off-by: Enzo Matsumiya <ematsum...@suse.de> ---- a/init.d/auditd.service -+++ b/init.d/auditd.service -@@ -37,12 +37,12 @@ RestrictRealtime=true +Index: audit-3.0.9/init.d/auditd.service +=================================================================== +--- audit-3.0.9.orig/init.d/auditd.service ++++ audit-3.0.9/init.d/auditd.service +@@ -41,12 +41,12 @@ RestrictRealtime=true # added automatically, for details please see # https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort ProtectSystem=full ++++++ harden_auditd.service.patch ++++++ --- /var/tmp/diff_new_pack.Tf1cLg/_old 2023-02-19 18:18:39.773367012 +0100 +++ /var/tmp/diff_new_pack.Tf1cLg/_new 2023-02-19 18:18:39.777367038 +0100 @@ -1,8 +1,10 @@ ---- a/init.d/auditd.service -+++ b/init.d/auditd.service -@@ -34,6 +34,15 @@ ProtectControlGroups=true +Index: audit-3.0.9/init.d/auditd.service +=================================================================== +--- audit-3.0.9.orig/init.d/auditd.service ++++ audit-3.0.9/init.d/auditd.service +@@ -38,6 +38,15 @@ LockPersonality=true + ProtectControlGroups=true ProtectKernelModules=true - ProtectHome=true RestrictRealtime=true +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort