forked from pool/elfutils
Updating link to change in openSUSE:Factory/elfutils revision 90.0
OBS-URL: https://build.opensuse.org/package/show/Base:System/elfutils?expand=0&rev=afe93b46a24cd7ec01f36e9d694141c3
This commit is contained in:
parent
23acc4a762
commit
ac8bf68b1e
@ -1,3 +1,9 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Sep 14 14:14:57 UTC 2021 - Martin Liška <mliska@suse.cz>
|
||||||
|
|
||||||
|
- Add harden_debuginfod.service.patch as
|
||||||
|
Automatic systemd hardening effort by the security team.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Aug 5 18:12:21 UTC 2021 - Martin Liška <mliska@suse.cz>
|
Thu Aug 5 18:12:21 UTC 2021 - Martin Liška <mliska@suse.cz>
|
||||||
|
|
||||||
|
@ -30,6 +30,7 @@ Source2: elfutils.changes
|
|||||||
Source3: elfutils.keyring
|
Source3: elfutils.keyring
|
||||||
Patch0: disable-run-readelf-self-test.patch
|
Patch0: disable-run-readelf-self-test.patch
|
||||||
Patch1: tests-Allow-an-extra-pthread_kill-frame-in-backtrace.patch
|
Patch1: tests-Allow-an-extra-pthread_kill-frame-in-backtrace.patch
|
||||||
|
Patch2: harden_debuginfod.service.patch
|
||||||
BuildRequires: autoconf
|
BuildRequires: autoconf
|
||||||
BuildRequires: automake
|
BuildRequires: automake
|
||||||
BuildRequires: bison
|
BuildRequires: bison
|
||||||
|
24
harden_debuginfod.service.patch
Normal file
24
harden_debuginfod.service.patch
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
Index: elfutils-0.185/config/debuginfod.service
|
||||||
|
===================================================================
|
||||||
|
--- elfutils-0.185.orig/config/debuginfod.service
|
||||||
|
+++ elfutils-0.185/config/debuginfod.service
|
||||||
|
@@ -12,6 +12,19 @@ ExecStart=/usr/bin/debuginfod -d /var/ca
|
||||||
|
# Stopping can take a long time if scanning of large archives is in progress
|
||||||
|
TimeoutStopSec=60
|
||||||
|
PrivateTmp=yes
|
||||||
|
+# added automatically, for details please see
|
||||||
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
+ProtectSystem=full
|
||||||
|
+ProtectHome=true
|
||||||
|
+PrivateDevices=true
|
||||||
|
+ProtectHostname=true
|
||||||
|
+ProtectClock=true
|
||||||
|
+ProtectKernelTunables=true
|
||||||
|
+ProtectKernelModules=true
|
||||||
|
+ProtectKernelLogs=true
|
||||||
|
+ProtectControlGroups=true
|
||||||
|
+RestrictRealtime=true
|
||||||
|
+# end of automatic additions
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
Loading…
Reference in New Issue
Block a user