From 55d16e1602c0221dbe00996a206d0691ef93ae71 Mon Sep 17 00:00:00 2001 From: Patrick Schleizer Date: Wed, 8 Jun 2022 09:04:03 -0400 Subject: [PATCH] remove unicode --- README.md | 2 +- .../25_default_whitelist_unix_chkpwd.conf | 2 +- usr/libexec/security-misc/permission-hardening | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index c14ce82..5a6a0c5 100644 --- a/README.md +++ b/README.md @@ -400,7 +400,7 @@ executing `systemctl enable hide-hardware-info.service` as root. * Linux Kernel Runtime Guard (LKRG) * tirdad - TCP ISN CPU Information Leak Protection. -* Kicksecure ™ - a security-hardened Linux Distribution +* Kicksecure (TM) - a security-hardened Linux Distribution * And more. * https://www.kicksecure.com/wiki/Linux_Kernel_Runtime_Guard_LKRG * https://github.com/Kicksecure/tirdad diff --git a/etc/permission-hardening.d/25_default_whitelist_unix_chkpwd.conf b/etc/permission-hardening.d/25_default_whitelist_unix_chkpwd.conf index 15ff326..e4597bd 100644 --- a/etc/permission-hardening.d/25_default_whitelist_unix_chkpwd.conf +++ b/etc/permission-hardening.d/25_default_whitelist_unix_chkpwd.conf @@ -6,6 +6,6 @@ ## configuration. When security-misc is updated, this file may be overwritten. ## required for performing password validation from unprivileged user -## processes such as KScreenLocker’s unlock prompt +## processes such as KScreenLocker's unlock prompt /usr/sbin/unix_chkpwd exactwhitelist /sbin/unix_chkpwd exactwhitelist diff --git a/usr/libexec/security-misc/permission-hardening b/usr/libexec/security-misc/permission-hardening index 9d78068..5382676 100755 --- a/usr/libexec/security-misc/permission-hardening +++ b/usr/libexec/security-misc/permission-hardening @@ -464,7 +464,7 @@ set_file_perms() { parse_config_folder() { # Query contents of password and group databases only once and buffer them # - # If we don’t buffer we sometimes get incorrect results when checking for entries using + # If we don't buffer we sometimes get incorrect results when checking for entries using # `if getent passwd | grep -q '^root:'; …` since `grep` exits after the first match in # this case causing `getent` to receive SIGPIPE, which then fails the pipeline since # `set -o pipefail` is set for this script.