audit-audispd-plugins-3.0.6-150400.4.16.1<>,feap9|ۦK, EІެ_+q !2D2겧'C1[Ljkiә00MV\Ź]x:\?)6EZKxpn;7dXĵ43?&S;_֬3-!^ a"$פI<ZZqO.͈:+0g~fi,gCBv]7XD_͏%i; ɘ͉}%@U?Ae'd65!պJL]80QDz %3>>V?Vd , U -?gmx     . <t,d  @ (x8&9 &: &FOiGOHOIOXPYP \PH]P^QzbQcRdS eSfSlSuS(vS`wUxV(yV` zVVVVVCaudit-audispd-plugins3.0.6150400.4.16.1Default plugins for the audit dispatcherThe audit-audispd-plugins package contains plugin components for the audit dispatcher (audispd).eanebbioloDGPL-2.0-or-laterhttps://www.suse.com/System/Monitoringhttps://people.redhat.com/sgrubb/audit/linuxppc64le`PA聠A聠聤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-secondary-3.0.6-150400.4.16.1.src.rpmaudit-audispd-pluginsaudit-audispd-plugins(ppc-64)config(audit-audispd-plugins)@@@@@@@@    config(audit-audispd-plugins)libauparse.so.0()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcap-ng.so.0()(64bit)liblber-2.4.so.2()(64bit)libldap_r-2.4.so.2()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.6-150400.4.16.13.0.4-14.6.0-14.0-15.2-14.14.3edhdhdq@bT@b?@b=b; aaaim@af@aHwaC1aS@a`D`@`@_ǁ_@^[\|[.6@[&M@ZlZZZz@ZyZ_:ZC@YYYu@Ym@VbUematsumiya@suse.deematsumiya@suse.deematsumiya@suse.deematsumiya@suse.dejengelh@inai.decoolo@suse.comematsumiya@suse.comdmueller@suse.comfvogt@suse.comgmbr3@opensuse.orggmbr3@opensuse.orgematsumiya@suse.comematsumiya@suse.comematsumiya@suse.commeissner@suse.comematsumiya@suse.comematsumiya@suse.comdimstar@opensuse.orgematsumiya@suse.comabergmann@suse.comlnussel@suse.detonyj@suse.comjengelh@inai.deantoine.belvire@opensuse.organtoine.belvire@opensuse.orgkukuk@suse.detonyj@suse.commeissner@suse.comtchvatal@suse.comnormand@linux.vnet.ibm.comtchvatal@suse.commpluskal@suse.comaavindraa@gmail.comdimstar@opensuse.orgjengelh@inai.detonyj@suse.comtchvatal@suse.comtonyj@suse.com- Fix plugin termination when using systemd service units (bsc#1215377) * add auditd.service-fix-plugin-termination.patch- Update audit-secondary.spec: create symbolic link from /sbin/audisp-syslog to /usr/sbin/audisp-syslog (bsc#1201519).- Fix rules not loaded when restarting auditd.service(bsc#1204844)- Check for AF_UNIX unnamed sockets (bsc#1210004) * add check-for-AF_UNIX-unnamed-sockets.patch- Drop buildrequire on C++ compiler. - Modernize specfile constructs.- Fix buildrequire for openldap2-devel - audit doesn't require the (outdated) C++ binding, but the C headers that happen to be pulled in by buildrequiring the C++ devel package- Fix unhandled ECONNREFUSED with LDAP environments (bsc#1196645) * add libaudit-fix-unhandled-ECONNREFUSED-from-getpwnam-25.patch - Fix hang in audisp-remote with disk_low_action=suspend (bsc#1196517) * add audisp-remote-fix-hang-with-disk_low_action-suspend-.patch- add audit-userspace-517-compat.patch- Use %autosetup - Don't include sample rules as %doc, they're already installed as normal files - Fix create-augenrules-service.patch: * auditd.service needs to require augenrules.service, not the other way around - Fix documentation for enable-stop-rules.patch- Update to version 3.0.6: * fixes a segfault on some SELINUX_ERR records * makes IPX packet interpretation dependent on the ipx header file existing * adds b32/b64 support to ausyscall * adds support for armv8l * fixes auditctl list of syscalls on PPC * auditd.service now restarts auditd under some conditions- Add CONFIG parameter to %sysusers_generate_pre- Create separate service for augenrules (bsc#1191614, bsc#1181400) * add create-augenrules-service.patch Remove ReadWritePaths=/etc/audit from auditd.service, also removes augenrules call from ExecStartPost. Create augenrules.service with the ReadWritePaths directive above. This makes /etc/audit only accessible by augenrules.service and let auditd.service (and daemon) to be sandboxed again. - Update audit-secondary.spec to accomodate the new service file.- Fix hardened auditd.service (bsc#1181400) * add fix-hardened-service.patch Make /etc/audit read-write from the service. Remove PrivateDevices=true to expose /dev/* to auditd.service. - Enable stop rules for audit.service (cf. bsc#1190227) * add enable-stop-rules.patch- Change default log_format from ENRICHED to RAW (bsc#1190500): * add change-default-log_format.patch (SUSE-specific patch) - Update to version 3.0.5: * In auditd, flush uid/gid caches when user/group added/deleted/modified * Fixed various issues when dealing with corrupted logs * In auditd, check if log_file is valid before closing handle - Include fixed from 3.0.4: * Apply performance speedups to auparse library * Optimize rule loading in auditctl * Fix an auparse memory leak caused by glibc-2.33 by replacing realpath * Update syscall table to the 5.14 kernel * Fixed various issues when dealing with corrupted logs- harden_auditd.service.patch: automatic hardening applied to systemd services- Update to version 3.0.3: * Dont interpret audit netlink groups unless AUDIT_NLGRP_MAX is defined * Add support for AUDIT_RESP_ORIGIN_UNBLOCK_TIMED to ids * Change auparse_feed_has_data in auparse to include incomplete events * Auditd, stop linking against -lrt * Add ProtectHome and RestrictRealtime to auditd.service * In auditd, read up to 3 netlink packets in a row * In auditd, do not validate path to plugin unless active * In auparse, only emit config errors when AUPARSE_DEBUG env variable exists - use https source urls- Adjust audit.spec and audit-secondary.spec to support new version - Include fix for libev * add libev-werror.patch - Update to version 3.0.2 - In audispd-statsd pluging, use struct sockaddr_storage (Ville Heikkinen) - Optionally interpret auid in auditctl -l - Update some syscall argument interpretations - In auditd, do not allow spaces in the hostname name format - Big documentation cleanup (MIZUTA Takeshi) - Update syscall table to the 5.12 kernel - Update the auparse normalizer for new event types - Fix compiler warnings in ids subsystem - Block a couple signals from flush & reconfigure threads - In auditd, don't wait on flush thread when exiting - Output error message if the path of input files are too long ausearch/report Included fixes from 3.0.1 - Update syscall table to the 5.11 kernel - Add new --eoe-timeout option to ausearch and aureport (Burn Alting) - Only enable periodic timers when listening on the network - Upgrade libev to 4.33 - Add auparse_new_buffer function to auparse library - Use the select libev backend unless aggregating events - Add sudoers to some base audit rules - Update the auparse normalizer for some new syscalls and event types Included fixes from 3.0 - Generate checkpoint file even when no results are returned (Burn Alting) - Fix log file creation when file logging is disabled entirely (Vlad Glagolev) - Convert auparse_test to run with python3 (Tomáš Chvátal) - Drop support for prelude - Adjust backlog_wait_time in rules to the kernel default (#1482848) - Remove ids key syntax checking of rules in auditctl - Use SIGCONT to dump auditd internal state (#1504251) - Fix parsing of virtual timestamp fields in ausearch_expression (#1515903) - Fix parsing of uid & success for ausearch - Add support for not equal operator in audit by executable (Ondrej Mosnacek) - Hide lru symbols in auparse - Add systemd process protections - Fix aureport summary time range reporting - Allow unlimited retries on startup for remote logging - Add queue_depth to remote logging stats and increase default queue_depth size - Fix segfault on shutdown - Merge auditd and audispd code - Close on execute init_pipe fd (#1587995) - Breakout audisp syslog plugin to be standalone program - Create a common internal library to reduce code - Move all audispd config files under /etc/audit/ - Move audispd.conf settings into auditd.conf - Add queue depth statistics to internal state dump report - Add network statistics to internal state dump report - SIGUSR now also restarts queue processing if its suspended - Update lookup tables for the 4.18 kernel - Add auparse_normalizer support for SOFTWARE_UPDATE event - Add 30-ospp-v42.rules to meet new Common Criteria requirements - Deprecate enable_krb and replace with transport config opt for remote logging - Mark netlabel events as simple events so that get processed quicker - When auditd is reconfiguring, only SIGHUP plugins with valid pid (#1614833) - In aureport, fix segfault in file report - Add auparse_normalizer support for labeled networking events - Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194) - In ausearch/auparse, event aging is off by a second - In ausearch/auparse, correct event ordering to process oldest first - Migrate auparse python test to python3 - auparse_reset was not clearing everything it should - Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events - In ausearch/report, lightly parse selinux portion of USER_AVC events - Add bpf syscall command argument interpretation to auparse - In ausearch/report, limit record size when malformed - Port af_unix plugin to libev - In auditd, fix extract_type function for network originating events - In auditd, calculate right size and location for network originating events - Make legacy script wait for auditd to terminate (#1643567) - Treat all network originating events as VER2 so dispatcher doesn't format it - If an event has a node name make it VER2 so dispatcher doesnt format it - In audisp-remote do an initial connection attempt (#1625156) - In auditd, allow expression of space left as a percentage (#1650670) - On PPC64LE systems, only allow 64 bit rules (#1462178) - Make some parts of auditd state report optional based on config - Update to libev-4.25 - Fix ausearch when checkpointing a single file (Burn Alting) - Fix scripting in 31-privileged.rules wrt filecap (#1662516) - In ausearch, do not checkpt if stdin is input source - In libev, remove __cold__ attribute for functions to allow proper hardening - Add tests to configure.ac for openldap support - Make systemd support files use /run rather than /var/run (Christian Hesse) - Fix minor memory leak in auditd kerberos credentials code - Allow exclude and user filter by executable name (Ondrej Mosnacek) - Fix auditd regression where keep_logs is limited by rotate_logs 2 file test - In ausearch/report fix --end to use midnight time instead of now (#1671338) - Add substitue functions for strndupa & rawmemchr - Fix memleak in auparse caused by corrected event ordering - Fix legacy reload script to reload audit rules when daemon is reloaded - Support for unescaping in trusted messages (Dmitry Voronin) - In auditd, use standard template for DEAMON events (Richard Guy Briggs) - In aureport, fix segfault for malformed USER_CMD events - Add exe field to audit_log_user_command in libaudit - In auditctl support filter on socket address families (Richard Guy Briggs) - Deprecate support for Alpha & IA64 processors - If space_left_action is rotate, allow it every time (#1718444) - In auparse, drop standalone EOE events - Add milliseconds column for ausearch extra time csv format - Fix aureport first event reporting when no start given - In audisp-remote, add new config item for startup connection errors - Remove dependency on chkconfig - Install rules to /usr/share/audit/sample-rules/ - Split up ospp rules to make SCAP scanning easier (#1746018) - In audisp-syslog, support interpreting records (#1497279) - Audit USER events now sends msg as name value pair - Add support for AUDIT_BPF event - Auditd should not process AUDIT_REPLACE events - Update syscall tables to the 5.5 kernel - Improve personality interpretation by using PERS_MASK - Speedup ausearch/report parsing RAW logging format by caching uid/name lookup - Change auparse python bindings to shared object (Issue #121) - Add error messages for watch permissions - If audit rules file doesn't exist log error message instead of info message - Revise error message for unmatched options in auditctl - In audisp-remote, fixup remote endpoint disappearin in ascii format - Add backlog_wait_time_actual reporting / resetting to auditctl (Max Englander) - In auditctl, add support for sending a signal to auditd - Removes audit-fno-common.patch: fixed in upstream - Removes audit-python3.patch: fixed in upstream- Do not explicitly provide group(audit) in system-users-audit: this is automatically handled by rpm/providers.- Create new "audit" group for read access to logs (bsc#1178154) * add change-default-log_group.patch * update audit-secondary.spec- Enable Aarch64 processor support. (bsc#1179515 bsc#1179806)- prepare usrmerge (boo#1029961)- Update to version 2.8.5: * Fix segfault on shutdown * Fix hang on startup (#1587995) * Add sleep to script to dump state so file is ready when needed * Add auparse_normalizer support for SOFTWARE_UPDATE event * Mark netlabel events as simple events so that get processed quicker * When audispd is reconfiguring, only SIGHUP plugins with valid pid (#1614833) * Add 30-ospp-v42.rules to meet new Common Criteria requirements * Update lookup tables for the 4.18 kernel * In aureport, fix segfault in file report * Add auparse_normalizer support for labeled networking events * Fix memory leak in audisp-remote plugin when using krb5 transport. (#1622194) * Event aging is off by a second * In ausearch/auparse, correct event ordering to process oldest first * auparse_reset was not clearing everything it should * Add support for AUDIT_MAC_CALIPSO_ADD, AUDIT_MAC_CALIPSO_DEL events * In ausearch/report, lightly parse selinux portion of USER_AVC events * In ausearch/report, limit record size when malformed * In auditd, fix extract_type function for network originating events * In auditd, calculate right size and location for network originating events * Treat all network originating events as VER2 so dispatcher doesn't format it * In audisp-remote do an initial connection attempt (#1625156) * In auditd, allow expression of space left as a percentage (#1650670) * On PPC64LE systems, only allow 64 bit rules (#1462178) * Make some parts of auditd state report optional based on config * Fix ausearch when checkpointing a single file (Burn Alting) * Fix scripting in 31-privileged.rules wrt filecap (#1662516) * In ausearch, do not checkpt if stdin is input source * In libev, remove __cold__ attribute for functions to allow proper hardening * Add tests to configure.ac for openldap support * Make systemd support files use /run rather than /var/run (Christian Hesse) * Fix minor memory leak in auditd kerberos credentials code * Fix auditd regression where keep_logs is limited by rotate_logs 2 file test * In ausearch/report fix --end to use midnight time instead of now (#1671338) - Fix build errors when using gcc-10 no-common default (bsc#1160384) New patch: audit-fno-common.patch - Refresh audit-allow-manual-stop.patch- Reduce scriptlets' hard dependency on systemd.- Update to version 2.8.4: * Generate checkpoint file even when not results are returned (Burn Alting). * Fix log file creation when file logging is disabled entirely (Vlad Glagolev). * Use SIGCONT to dump auditd internal state (rh#1504251). * Fix parsing of virtual timestamp fields in ausearch_expression (rh#1515903). * Fix parsing of uid & success for ausearch. * Hide lru symbols in auparse. * Fix aureport summary time range reporting. * Allow unlimited retries on startup for remote logging. * Add queue_depth to remote logging stats and increase default queue_depth size.- Update to version 2.8.3: * Correct msg function name in lru debug code. * Fix a segfault in auditd when dns resolution isn't available. * Make a reload legacy service for auditd. * In auparse python bindings, expose some new types that were missing. * In normalizer, pickup subject kind for user_login events. * Fix interpretation of unknown ioctcmds (rh#1540507). * Add ANOM_LOGIN_SERVICE, RESP_ORIGIN_BLOCK, & RESP_ORIGIN_BLOCK_TIMED events. * In auparse_normalize for USER_LOGIN events, map acct for subj_kind. * Fix logging of IPv6 addresses in DAEMON_ACCEPT events (rh#1534748). * Do not rotate auditd logs when num_logs < 2 (brozs).- Use %license instead of %doc [bsc#1082318]- Change openldap dependency to client only (bsc#1085003) - Resolve issue with previous change if both Python2 and Python3 are present, tests were failing as python2 bindings are preferred in this case.- reverted -j1 force ppc specific only- Add patch to fix test run without python2 interpreter: * audit-python3.patch - Update to 2.8.2 release: * Update tables for 4.14 kernel * Fixup ipv6 server side binding * AVC report from aureport was missing result column header (#1511606) * Add SOFTWARE_UPDATE event * In ausearch/report pickup any path and new-disk fields as a file * Fix value returned by auditctl --reset-lost (Richard Guy Briggs) * In auparse, fix expr_create_timestamp_comparison_ex to be numeric field * Fix building on old systems without linux/fanotify.h * Fix shell portability issues reported by shellcheck * Auditd validate_email should not use gethostbyname- force -j1 for PowerPC make check to avoid build failure (lookup_test.o: file not recognized: File truncated)- Add conditions around python plugins to allow us to conditionalize them in enviroment without python2- Rename python binding packages to match current python packaging standards - Update python build dependencies to resolve future split of python2/3- Update to version 2.8.1. See audit.spec (libaudit1) for upstream changelog - Remove audit-implicit-writev.patch (fixed upstream across 2 commits) * 3b30db20ad983274989ce9a522120c3c225436b3 * 07132c22314e9abbe64d1031fd8734243285bb3f - Cleanup with spec-cleaner- Add audit-implicit-writev.patch: include sys/uio.h to ensure readv and writev are declared.- Rectify RPM groups, diversify descriptions. - Remove mentions of static libraries because they are not built.- Update to version 2.7.7. See audit.spec (libaudit1) for upstream changelog Since commit 6cf57d27 (2.7.4) audit is now started as an non-forking service (bsc#1042781). Add config: audit-stop.rules Refresh patch: audit-allow-manual-stop.patch Refresh patch: audit-no-gss.patch- Version update to 2.5. See audit.spec (libaudit1) for upstream changelog - Cleanup with spec-cleaner - Sort out bit /sbin /usr/sbin/ installation - Install the rules as documentation - Remove needless %py_requires from python subpkgs- Update to version 2.4.4. See audit.spec (libaudit1) for upstream changelog - Add python3 bindings for libaudit and libauparse - Remove patch 'audit-no_m4_dir.patch' (added Fri Apr 26 11:14:39 UTC 2013 by mmeister@suse.com) No idea what earlier 'automake' build error this was trying to fix but it broke the handling of "--without-libcap-ng". Anyways, no build error occurs now and m4 path is also needed in v2.4.4 to find ax_prog_cc_for_buildnebbiolo 1707237835 3.0.6-150400.4.16.13.0.6-150400.4.16.13.0.6-150400.4.16.1auditaudisp-remote.confplugins.dau-remote.confaudispd-zos-remote.confzos-remote.confaudisp-remoteaudispd-zos-remoteaudisp-remote.conf.5.gzauditd-plugins.5.gzzos-remote.conf.5.gzaudisp-remote.8.gzaudisp-syslog.8.gzaudispd-zos-remote.8.gz/etc//etc/audit//etc/audit/plugins.d//usr/sbin//usr/share/man/man5//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32494/SUSE_SLE-15-SP4_Update/73526a089598575fd6d5cd1f42c951bd-audit-secondary.SUSE_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linuxdirectoryASCII textELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=47129706aee2f1ed3e99c7899ceb7febc3cc1877, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=ff73e6c8e4ea49cd747997bd92dd3383eac248fd, for GNU/Linux 3.10.0, strippedtroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRRRRRTWk(c`utf-857ab91572950a36a5b733e199e46f9d7c56c75733cb6c28baf2bedb4aaf01e92? 7zXZ !t/!% ]"k%t[lZpv5Rsn> N釭)`"}TbOc"KSR\RitƘ PXo'SzuTc6[w_"9ofbq@yhu4?93@@Jnۅ_$]d z}]=p]0V{-7Qp()7LRu2!/Fl-5+EzP.-Q1L!K!)GW!7?OWHk~~AI|b\6nbJS oӞCRC.\|\Dgn}:*QtU%mU Nܹt;o9!nOM& tjiT?.xEFgLdj83R2.ݧ֊+c%"[97Rrn 쾿8}=:+Q>%ޜd.m8^yOk=*,{Vx1GCCQ꿡֣^d)Qwc|or@~fgaw4Ţ:C&?(V\%55-Ʈ^C#S8B/ɢm7u%t5m GM1"k]TZ]\P2A ~ 1ktg >>]I*X>jWuN[¬.CH%{zMA704B@ུ~|/^X kj|ZU_ \_7M1tJ8d"D57C7Hz^[uzP2ùsa4 Pҟs 4f-Uy'@!-ӎLl!:֏bILO%$d8G5 ξxͼ-70d#d}T95wwiCdKp4y #MH55^˓4G)A*ʒ!Y(3?q.͗ǰg`Rxض6q:6 n8ޱJ*: j Q?T_6c?j4Gw m2dgłri|ۊ a9m݆uZ .+]=HiT:hI0s|*:SѤ.˧K 0˚bt+Ӯy!1 pi 'ďpp𦋋``DfXa (GU|uppSdl04BrEVg>nw Tq5{ pKZM/9|)50dה>bDZg` c-n$G"cmu[?9zi45wtX9o <=ehU'KhB4S=&r)BR"s58I*W̢hِ>JV‰ !TO h"I'u'Ok1H@C`B~Ώ4D7^}d0lD_0D$0Ebo$?*OuƌG.#"rGZMg'Z`H@ݧWrSgKu X_+zgbuNCt:֍D?7&CbJc?F!?EvT`0ur2:Axgތ\P|iŃc+= K DY2eU;2jL/Y opU.#dg5ɜWqب鷿tBgн~:ĵs =$ΘQw!H1~Z#~0;0! TxrjAF87BWgW:|"]ӭP ec`ABCTp ]4N;pVx~o1B.X:(0rܿd R71JvO ~[/l~ҭ~'Zi v-:Ҭv\yz 1nOks Q^1`:?; uP8mP$R%+J:>8g9HWq] ̆$ĸTK-2ӄ+b>)݁79NF/b[0$y8u^.w^`'c8h+?OǤm0`9}]DodOjIJ3}WEt\!R +\yz⿙[[':)`*Jbf` m۔K6k ]:= R+6xD:!Zġ*ܯin|((h2B YZ