New upstream bugfix release

This commit is contained in:
sgrubb 2016-07-14 11:57:27 -04:00
parent c7215bd3fb
commit e399a8099b
4 changed files with 8 additions and 66 deletions

1
.gitignore vendored
View File

@ -139,3 +139,4 @@ audit-2.0.4.tar.gz
/audit-2.6.2.tar.gz /audit-2.6.2.tar.gz
/audit-2.6.3.tar.gz /audit-2.6.3.tar.gz
/audit-2.6.4.tar.gz /audit-2.6.4.tar.gz
/audit-2.6.5.tar.gz

View File

@ -1,60 +0,0 @@
diff -urp audit-2.6.5.orig/audisp/audispd.c audit-2.6.5/audisp/audispd.c
--- audit-2.6.5.orig/audisp/audispd.c 2016-07-08 12:17:53.000000000 -0400
+++ audit-2.6.5/audisp/audispd.c 2016-07-08 17:11:18.659015835 -0400
@@ -825,13 +825,25 @@ static void process_inbound_event(int fd
if (rc > 0) {
/* Sanity check */
- if (!(e->hdr.ver == AUDISP_PROTOCOL_VER ||
- e->hdr.ver == AUDISP_PROTOCOL_VER2) ||
- e->hdr.hlen != sizeof(e->hdr) ||
- e->hdr.size > MAX_AUDIT_MESSAGE_LENGTH) {
+ if ((e->hdr.ver != AUDISP_PROTOCOL_VER &&
+ e->hdr.ver != AUDISP_PROTOCOL_VER2)) {
+ syslog(LOG_ERR,
+ "Unknown dispatcher protocol %u, exiting",
+ e->hdr.ver);
free(e);
+ exit(1);
+ }
+ if (e->hdr.hlen != sizeof(e->hdr)) {
syslog(LOG_ERR,
- "Dispatcher protocol mismatch, exiting");
+ "Header length mismatch %u %lu, exiting",
+ e->hdr.hlen, sizeof(e->hdr));
+ free(e);
+ exit(1);
+ }
+ if (e->hdr.size > MAX_AUDIT_MESSAGE_LENGTH) {
+ syslog(LOG_ERR, "Header size mismatch %d, exiting",
+ e->hdr.size);
+ free(e);
exit(1);
}
diff -urp audit-2.6.5.orig/src/auditd-dispatch.c audit-2.6.5/src/auditd-dispatch.c
--- audit-2.6.5.orig/src/auditd-dispatch.c 2016-07-08 12:17:53.000000000 -0400
+++ audit-2.6.5/src/auditd-dispatch.c 2016-07-08 17:00:58.081896384 -0400
@@ -183,17 +183,19 @@ int dispatch_event(const struct audit_re
hdr.ver = protocol_ver;
hdr.hlen = sizeof(struct audit_dispatcher_header);
hdr.type = rep->type;
- hdr.size = rep->len;
vec[0].iov_base = (void*)&hdr;
vec[0].iov_len = sizeof(hdr);
if (protocol_ver == AUDISP_PROTOCOL_VER) {
+ hdr.size = rep->msg.nlh.nlmsg_len;
vec[1].iov_base = (void*)rep->message;
vec[1].iov_len = rep->msg.nlh.nlmsg_len;
- } else {
+ } else if (protocol_ver == AUDISP_PROTOCOL_VER2) {
+ hdr.size = rep->len;
vec[1].iov_base = (void*)rep->msg.data;
vec[1].iov_len = rep->len;
- }
+ } else
+ return 0;
do {
rc = writev(disp_pipe[1], vec, 2);

View File

@ -2,14 +2,13 @@
Summary: User space tools for 2.6 kernel auditing Summary: User space tools for 2.6 kernel auditing
Name: audit Name: audit
Version: 2.6.4 Version: 2.6.5
Release: 2%{?dist} Release: 1%{?dist}
License: GPLv2+ License: GPLv2+
Group: System Environment/Daemons Group: System Environment/Daemons
URL: http://people.redhat.com/sgrubb/audit/ URL: http://people.redhat.com/sgrubb/audit/
Source0: http://people.redhat.com/sgrubb/audit/%{name}-%{version}.tar.gz Source0: http://people.redhat.com/sgrubb/audit/%{name}-%{version}.tar.gz
Source1: https://www.gnu.org/licenses/lgpl-2.1.txt Source1: https://www.gnu.org/licenses/lgpl-2.1.txt
Patch1: audit-2.6.5-disp-hdr.patch
BuildRequires: openldap-devel BuildRequires: openldap-devel
BuildRequires: swig BuildRequires: swig
BuildRequires: python-devel BuildRequires: python-devel
@ -114,7 +113,6 @@ Management Facility) database, through an IBM Tivoli Directory Server
%prep %prep
%setup -q %setup -q
cp %{SOURCE1} . cp %{SOURCE1} .
%patch1 -p1
%build %build
%configure --sbindir=/sbin --libdir=/%{_lib} --with-python=yes \ %configure --sbindir=/sbin --libdir=/%{_lib} --with-python=yes \
@ -184,7 +182,7 @@ if [ "$files" -eq 0 ] ; then
else else
touch /etc/audit/rules.d/audit.rules touch /etc/audit/rules.d/audit.rules
fi fi
chmod 0640 /etc/audit/rules.d/audit.rules chmod 0600 /etc/audit/rules.d/audit.rules
fi fi
%systemd_post auditd.service %systemd_post auditd.service
@ -310,6 +308,9 @@ fi
%attr(750,root,root) /sbin/audispd-zos-remote %attr(750,root,root) /sbin/audispd-zos-remote
%changelog %changelog
* Thu Jul 14 2016 Steve Grubb <sgrubb@redhat.com> 2.6.5-1
- New upstream bugfix release
* Fri Jul 08 2016 Steve Grubb <sgrubb@redhat.com> 2.6.4-2 * Fri Jul 08 2016 Steve Grubb <sgrubb@redhat.com> 2.6.4-2
- Correct size information of dispatched event - Correct size information of dispatched event

View File

@ -1 +1 @@
366710a166462ee654a59cb657c94b5e audit-2.6.4.tar.gz 8afcef84744d5f43206a33eacb83c104 audit-2.6.5.tar.gz