-
Notifications
You must be signed in to change notification settings - Fork 256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
General hardening #7764
General hardening #7764
Conversation
976a4f0
to
9b1d1d0
Compare
Ironically, I did spot that previously and applied it in cc675eb in part. |
This PR is mentioned in a vulnerability report. By not assigning CVEs, downstream maintainers (like distros) will not know which security patches are required for backporting to make downstream users of SSSD secure. |
Not a "vulnerability" but a "weaknesses". |
9b1d1d0
to
6ae7d35
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi,
thanks, looks like integrations tests are passing now. I'm fine with the patch, but I might be biased, nevertheless, ACK.
bye,
Sumit
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Pushed PR: #7764 |
Clear env of privileged 'sssd_pam' as a security hardening measure.