|
Bugzilla – Full Text Bug Listing |
| Summary: | AUDIT-0: libcap2: review and whitelist pam_cap | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Audits | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | matthias.gerstner |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Marcus Meissner
2023-06-12 13:45:12 UTC
We already looked into it twice, see bug 1203481. The module is deemed inherently insecure and thus we never whitelisted it. We considered offering this in an opt-in manner (i.e. requiring an additional explicit configuration step), but there is no easy way to do that. currently it would be a separate RPM, would this be opt-in enough=? (In reply to meissner@suse.com from comment #2) > currently it would be a separate RPM, would this be opt-in enough=? Up to now we did not consider this enough. Installing an RPM can be a side effect of some `Requires:` or even be triggered from unprivileged users when following the packagekit model. Discussed it shortly in the meeting. Closing it, please reopen if the customer use case can't be fulfilled any other way |