Hello community, here is the log from the commit of package permissions for openSUSE:Factory checked in at 2019-07-16 08:28:37 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/permissions (Old) and /work/SRC/openSUSE:Factory/.permissions.new.1887 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "permissions" Tue Jul 16 08:28:37 2019 rev:124 rq:714806 version:unknown Changes: -------- --- /work/SRC/openSUSE:Factory/permissions/permissions.changes 2019-06-26 16:01:31.675420223 +0200 +++ /work/SRC/openSUSE:Factory/.permissions.new.1887/permissions.changes 2019-07-16 08:28:38.535387305 +0200 @@ -1,0 +2,13 @@ +Thu Jul 11 14:21:23 UTC 2019 - [email protected] + +- Update to version 20190711: + * iputils: Add capability permissions for clockdiff (bsc#1140994) + +------------------------------------------------------------------- +Wed Jul 10 12:29:08 UTC 2019 - [email protected] + +- Update to version 20190710: + * iputils/ping: Drop effective capability + * iputils/ping6: Remove definitions + +------------------------------------------------------------------- Old: ---- permissions-20190521.tar.xz New: ---- permissions-20190711.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ permissions.spec ++++++ --- /var/tmp/diff_new_pack.2UCpLS/_old 2019-07-16 08:28:38.991387371 +0200 +++ /var/tmp/diff_new_pack.2UCpLS/_new 2019-07-16 08:28:38.991387371 +0200 @@ -12,11 +12,11 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# Please submit bugfixes or comments via https://bugs.opensuse.org/ # -%define VERSION 20190521 +%define VERSION 20190711 Name: permissions Version: %{VERSION} ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.2UCpLS/_old 2019-07-16 08:28:39.027387376 +0200 +++ /var/tmp/diff_new_pack.2UCpLS/_new 2019-07-16 08:28:39.031387377 +0200 @@ -1,4 +1,4 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/openSUSE/permissions.git</param> - <param name="changesrevision">aafb12397dbea3f9d50d403a05cbf79f869f6fe3</param></service></servicedata> \ No newline at end of file + <param name="changesrevision">5da6a81e38bb74f2090d73208b1a0101a0c5b73b</param></service></servicedata> \ No newline at end of file ++++++ permissions-20190521.tar.xz -> permissions-20190711.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190521/permissions.easy new/permissions-20190711/permissions.easy --- old/permissions-20190521/permissions.easy 2019-05-21 10:40:59.000000000 +0200 +++ new/permissions-20190711/permissions.easy 2019-07-11 16:16:25.000000000 +0200 @@ -115,10 +115,10 @@ # # networking (need root for the privileged socket) # +/usr/bin/clockdiff root:root 0755 + +capabilities cap_net_raw=p /usr/bin/ping root:root 0755 - +capabilities cap_net_raw=ep -/usr/bin/ping6 root:root 0755 - +capabilities cap_net_raw=ep + +capabilities cap_net_raw=p # mtr is linked against ncurses. For dialout only. /usr/sbin/mtr root:dialout 0750 +capabilities cap_net_raw=ep diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190521/permissions.paranoid new/permissions-20190711/permissions.paranoid --- old/permissions-20190521/permissions.paranoid 2019-05-21 10:40:59.000000000 +0200 +++ new/permissions-20190711/permissions.paranoid 2019-07-11 16:16:25.000000000 +0200 @@ -131,8 +131,8 @@ # # networking (need root for the privileged socket) # +/usr/bin/clockdiff root:root 0755 /usr/bin/ping root:root 0755 -/usr/bin/ping6 root:root 0755 # mtr is linked against ncurses. /usr/sbin/mtr root:dialout 0750 /usr/bin/rcp root:root 0755 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190521/permissions.secure new/permissions-20190711/permissions.secure --- old/permissions-20190521/permissions.secure 2019-05-21 10:40:59.000000000 +0200 +++ new/permissions-20190711/permissions.secure 2019-07-11 16:16:25.000000000 +0200 @@ -156,10 +156,10 @@ # # networking (need root for the privileged socket) # +/usr/bin/clockdiff root:root 0755 + +capabilities cap_net_raw=p /usr/bin/ping root:root 0755 - +capabilities cap_net_raw=ep -/usr/bin/ping6 root:root 0755 - +capabilities cap_net_raw=ep + +capabilities cap_net_raw=p # mtr is linked against ncurses. no suid bit, for root only: /usr/sbin/mtr root:dialout 0750 /usr/bin/rcp root:root 4755
