Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package pmacct for openSUSE:Factory checked in at 2021-10-25 15:17:24 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/pmacct (Old) and /work/SRC/openSUSE:Factory/.pmacct.new.1890 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "pmacct" Mon Oct 25 15:17:24 2021 rev:10 rq:927183 version:1.7.6 Changes: -------- --- /work/SRC/openSUSE:Factory/pmacct/pmacct.changes 2021-03-18 22:55:33.743571144 +0100 +++ /work/SRC/openSUSE:Factory/.pmacct.new.1890/pmacct.changes 2021-10-25 15:18:14.973706250 +0200 @@ -1,0 +2,8 @@ +Tue Oct 19 09:52:31 UTC 2021 - Johannes Segitz <[email protected]> + +- Added hardening to systemd service(s) (bsc#1181400). Modified: + * pmacct.nfacctd.service + * pmacct.pmacctd.service + * pmacct.sfacctd.service + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pmacct.nfacctd.service ++++++ --- /var/tmp/diff_new_pack.QEIZtS/_old 2021-10-25 15:18:15.921706843 +0200 +++ /var/tmp/diff_new_pack.QEIZtS/_new 2021-10-25 15:18:15.921706843 +0200 @@ -3,6 +3,17 @@ After=network.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +ProtectHostname=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=forking EnvironmentFile=-/etc/sysconfig/nfacctd ExecStart=/usr/sbin/nfacctd -f ${NFACCTD_CONF} $DAEMON_OPTS ++++++ pmacct.pmacctd.service ++++++ --- /var/tmp/diff_new_pack.QEIZtS/_old 2021-10-25 15:18:15.953706863 +0200 +++ /var/tmp/diff_new_pack.QEIZtS/_new 2021-10-25 15:18:15.953706863 +0200 @@ -3,6 +3,17 @@ After=network.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +ProtectHostname=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=forking EnvironmentFile=-/etc/sysconfig/pmacctd ExecStart=/usr/sbin/pmacctd -f ${PMACCTD_CONF} $DAEMON_OPTS ++++++ pmacct.sfacctd.service ++++++ --- /var/tmp/diff_new_pack.QEIZtS/_old 2021-10-25 15:18:15.985706883 +0200 +++ /var/tmp/diff_new_pack.QEIZtS/_new 2021-10-25 15:18:15.985706883 +0200 @@ -3,6 +3,17 @@ After=network.target [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=true +ProtectHostname=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=forking EnvironmentFile=-/etc/sysconfig/sfacctd ExecStart=/usr/sbin/sfacctd -f ${SFACCTD_CONF} $DAEMON_OPTS
