Accepting request 920602 from security
OBS-URL: https://build.opensuse.org/request/show/920602 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fail2ban?expand=0&rev=62
This commit is contained in:
commit
f06ef51bbe
@ -1,3 +1,9 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 14 07:47:32 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||
|
||||
- Added hardening to systemd service(s) (bsc#1181400). Added patch(es):
|
||||
* harden_fail2ban.service.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Aug 24 13:40:32 UTC 2021 - Johannes Weberhofer <jweberhofer@weberhofer.at>
|
||||
|
||||
|
@ -51,6 +51,7 @@ Patch201: %{name}-0.10.4-env-script-interpreter.patch
|
||||
Patch300: fail2ban-opensuse-service-sfw.patch
|
||||
# PATCH-FIX-UPSTREAM fail2ban-0.11.2-upstream-patch-for-CVE-2021-32749.patch jweberhofer@weberhofer.at -- fixes CVE-2021-32749
|
||||
Patch400: fail2ban-0.11.2-upstream-patch-for-CVE-2021-32749.patch
|
||||
Patch401: harden_fail2ban.service.patch
|
||||
|
||||
BuildRequires: fdupes
|
||||
BuildRequires: logrotate
|
||||
@ -137,6 +138,7 @@ sed -i -e 's/^before = paths-.*/before = paths-opensuse.conf/' config/jail.conf
|
||||
%patch300 -p1
|
||||
%endif
|
||||
%patch400 -p1
|
||||
%patch401 -p1
|
||||
|
||||
rm config/paths-arch.conf \
|
||||
config/paths-debian.conf \
|
||||
|
23
harden_fail2ban.service.patch
Normal file
23
harden_fail2ban.service.patch
Normal file
@ -0,0 +1,23 @@
|
||||
Index: fail2ban-0.11.2/files/fail2ban.service.in
|
||||
===================================================================
|
||||
--- fail2ban-0.11.2.orig/files/fail2ban.service.in
|
||||
+++ fail2ban-0.11.2/files/fail2ban.service.in
|
||||
@@ -5,6 +5,18 @@ After=network.target iptables.service fi
|
||||
PartOf=firewalld.service ipset.service nftables.service
|
||||
|
||||
[Service]
|
||||
+# added automatically, for details please see
|
||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
+ProtectSystem=full
|
||||
+ProtectHome=true
|
||||
+PrivateDevices=true
|
||||
+ProtectHostname=true
|
||||
+ProtectClock=true
|
||||
+ProtectKernelTunables=true
|
||||
+ProtectKernelModules=true
|
||||
+ProtectControlGroups=true
|
||||
+RestrictRealtime=true
|
||||
+# end of automatic additions
|
||||
Type=simple
|
||||
EnvironmentFile=-/etc/sysconfig/fail2ban
|
||||
Environment="PYTHONNOUSERSITE=1"
|
Loading…
Reference in New Issue
Block a user