Accepting request 919892 from network:fcoe

OBS-URL: https://build.opensuse.org/request/show/919892
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fcoe-utils?expand=0&rev=22
This commit is contained in:
Dominique Leuenberger 2021-09-21 19:12:17 +00:00 committed by Git OBS Bridge
commit c52e49e162
3 changed files with 29 additions and 0 deletions

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Tue Sep 14 08:23:41 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Added patch(es):
* harden_fcoe.service.patch
-------------------------------------------------------------------
Thu Mar 25 17:09:14 UTC 2021 - Lee Duncan <lduncan@suse.com>

View File

@ -37,6 +37,7 @@ Summary: FCoE userspace management tools
License: GPL-2.0-only
Group: System/Daemons
Source: %{name}-%{version}.tar.xz
Patch0: harden_fcoe.service.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%{?systemd_requires}
@ -47,6 +48,7 @@ connections.
%prep
%setup -q
%patch0 -p1
%build
autoreconf -vi

21
harden_fcoe.service.patch Normal file
View File

@ -0,0 +1,21 @@
Index: fcoe-utils-1.0.34/etc/systemd/fcoe.service
===================================================================
--- fcoe-utils-1.0.34.orig/etc/systemd/fcoe.service
+++ fcoe-utils-1.0.34/etc/systemd/fcoe.service
@@ -3,6 +3,16 @@ Description=Open-FCoE initiator daemon
After=syslog.target network.target
[Service]
+# added automatically, for details please see
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=full
+ProtectHome=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictRealtime=true
+# end of automatic additions
Type=simple
EnvironmentFile=/etc/fcoe/config
ExecStartPre=/sbin/modprobe -qa $SUPPORTED_DRIVERS