Hello community, here is the log from the commit of package permissions for openSUSE:Factory checked in at 2019-09-11 10:24:38 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/permissions (Old) and /work/SRC/openSUSE:Factory/.permissions.new.7948 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "permissions" Wed Sep 11 10:24:38 2019 rev:125 rq:727267 version:unknown Changes: -------- --- /work/SRC/openSUSE:Factory/permissions/permissions.changes 2019-07-16 08:28:38.535387305 +0200 +++ /work/SRC/openSUSE:Factory/.permissions.new.7948/permissions.changes 2019-09-11 10:24:40.455478892 +0200 @@ -1,0 +2,19 @@ +Fri Aug 30 14:20:09 UTC 2019 - [email protected] + +- Update to version 20190830: + * dumpcap: remove 'other' executable bit because of capabilities (boo#1148788, CVE-2019-3687) + +------------------------------------------------------------------- +Thu Aug 29 15:38:28 UTC 2019 - [email protected] + +- Update to version 20190829: + * add one more missing slash for icinga2 + * fix more missing slashes for directories + +------------------------------------------------------------------- +Tue Aug 20 08:56:35 UTC 2019 - [email protected] + +- Update to version 20190820: + * cron directory permissions: add slashes + +------------------------------------------------------------------- Old: ---- permissions-20190711.tar.xz New: ---- permissions-20190830.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ permissions.spec ++++++ --- /var/tmp/diff_new_pack.NZ6Oad/_old 2019-09-11 10:24:41.471478765 +0200 +++ /var/tmp/diff_new_pack.NZ6Oad/_new 2019-09-11 10:24:41.475478765 +0200 @@ -16,7 +16,7 @@ # -%define VERSION 20190711 +%define VERSION 20190830 Name: permissions Version: %{VERSION} ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.NZ6Oad/_old 2019-09-11 10:24:41.507478761 +0200 +++ /var/tmp/diff_new_pack.NZ6Oad/_new 2019-09-11 10:24:41.507478761 +0200 @@ -1,4 +1,4 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/openSUSE/permissions.git</param> - <param name="changesrevision">5da6a81e38bb74f2090d73208b1a0101a0c5b73b</param></service></servicedata> \ No newline at end of file + <param name="changesrevision">081d081dcfaf61710bda34bc21c80c66276119aa</param></service></servicedata> \ No newline at end of file ++++++ permissions-20190711.tar.xz -> permissions-20190830.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190711/permissions.easy new/permissions-20190830/permissions.easy --- old/permissions-20190711/permissions.easy 2019-07-11 16:16:25.000000000 +0200 +++ new/permissions-20190830/permissions.easy 2019-08-30 16:19:23.000000000 +0200 @@ -31,11 +31,11 @@ /var/lib/nfs/rmtab root:root 644 /etc/syslog.conf root:root 644 /etc/ssh/sshd_config root:root 640 -/etc/cron.d root:root 755 -/etc/cron.daily root:root 755 -/etc/cron.hourly root:root 755 -/etc/cron.monthly root:root 755 -/etc/cron.weekly root:root 755 +/etc/cron.d/ root:root 755 +/etc/cron.daily/ root:root 755 +/etc/cron.hourly/ root:root 755 +/etc/cron.monthly/ root:root 755 +/etc/cron.weekly/ root:root 755 # # suid system programs that need the suid bit to work: @@ -287,7 +287,7 @@ /sbin/mount.ecryptfs_private root:root 4755 # wireshark (bsc#957624) -/usr/bin/dumpcap root:wireshark 0755 +/usr/bin/dumpcap root:wireshark 0750 +capabilities cap_net_raw,cap_net_admin=ep # singularity (bsc#1028304) @@ -357,7 +357,7 @@ +capabilities cap_net_bind_service=ep # icinga2 (bsc#1069410) -/run/icinga2/cmd icinga:icingagmd 2750 +/run/icinga2/cmd/ icinga:icingagmd 2750 # fping (bsc#1047921) /usr/sbin/fping root:root 0755 @@ -365,7 +365,7 @@ # usbauth (bsc#1066877) /usr/bin/usbauth-npriv root:usbauth 04750 -/usr/lib/usbauth-notifier root:usbauth-notifier 0750 +/usr/lib/usbauth-notifier/ root:usbauth-notifier 0750 /usr/lib/usbauth-notifier/usbauth-notifier root:usbauth 02755 # spice-gtk (bsc#1101420) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190711/permissions.paranoid new/permissions-20190830/permissions.paranoid --- old/permissions-20190711/permissions.paranoid 2019-07-11 16:16:25.000000000 +0200 +++ new/permissions-20190830/permissions.paranoid 2019-08-30 16:19:23.000000000 +0200 @@ -47,11 +47,11 @@ /var/lib/nfs/rmtab root:root 600 /etc/syslog.conf root:root 600 /etc/ssh/sshd_config root:root 600 -/etc/cron.d root:root 700 -/etc/cron.daily root:root 700 -/etc/cron.hourly root:root 700 -/etc/cron.monthly root:root 700 -/etc/cron.weekly root:root 700 +/etc/cron.d/ root:root 700 +/etc/cron.daily/ root:root 700 +/etc/cron.hourly/ root:root 700 +/etc/cron.monthly/ root:root 700 +/etc/cron.weekly/ root:root 700 # # suid system programs that need the suid bit to work: @@ -363,14 +363,14 @@ /usr/lib/gvfs/gvfsd-nfs root:root 0755 # icinga2 (bsc#1069410) -/run/icinga2/cmd icinga:icingagmd 0750 +/run/icinga2/cmd/ icinga:icingagmd 0750 # fping (bsc#1047921) /usr/sbin/fping root:root 0755 # usbauth (bsc#1066877) /usr/bin/usbauth-npriv root:usbauth 0750 -/usr/lib/usbauth-notifier root:usbauth-notifier 0750 +/usr/lib/usbauth-notifier/ root:usbauth-notifier 0750 /usr/lib/usbauth-notifier/usbauth-notifier root:usbauth 0755 # spice-gtk (bsc#1101420) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20190711/permissions.secure new/permissions-20190830/permissions.secure --- old/permissions-20190711/permissions.secure 2019-07-11 16:16:25.000000000 +0200 +++ new/permissions-20190830/permissions.secure 2019-08-30 16:19:23.000000000 +0200 @@ -71,11 +71,11 @@ /etc/ssh/sshd_config root:root 600 # we might want to tighten that up in the future in this profile (remove the # ability for others to read/enter) -/etc/cron.d root:root 755 -/etc/cron.daily root:root 755 -/etc/cron.hourly root:root 755 -/etc/cron.monthly root:root 755 -/etc/cron.weekly root:root 755 +/etc/cron.d/ root:root 755 +/etc/cron.daily/ root:root 755 +/etc/cron.hourly/ root:root 755 +/etc/cron.monthly/ root:root 755 +/etc/cron.weekly/ root:root 755 # # suid system programs that need the suid bit to work: @@ -397,7 +397,7 @@ /usr/lib/gvfs/gvfsd-nfs root:root 0755 # icinga2 (bsc#1069410) -/run/icinga2/cmd icinga:icingagmd 2750 +/run/icinga2/cmd/ icinga:icingagmd 2750 # fping (bsc#1047921) /usr/sbin/fping root:root 0755 @@ -405,7 +405,7 @@ # usbauth (bsc#1066877) /usr/bin/usbauth-npriv root:usbauth 04750 -/usr/lib/usbauth-notifier root:usbauth-notifier 0750 +/usr/lib/usbauth-notifier/ root:usbauth-notifier 0750 /usr/lib/usbauth-notifier/usbauth-notifier root:usbauth 02755 # spice-gtk (bsc#1101420)
