Package: lxqt-sudo Version: 0.14.1-1 Severity: critical Tags: patch Configurations are written into wrong directories etc - not funny, if a programm is called with lxsudo again the false written config will be read, if called with a right working (graphical) sudo not.
Informations written into wrong directories might cause security breaches. -- System Information: Debian Release: 10.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'buildd-unstable'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.1.1-towo.1-siduction-amd64 (SMP w/8 CPU cores; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) Versions of packages lxqt-sudo depends on: ii libc6 2.28-10 ii liblxqt0 0.14.2~12-ga398a7c-1 ii libqt5core5a 5.11.3+dfsg1-1 ii libqt5gui5 5.11.3+dfsg1-1 ii libqt5widgets5 5.11.3+dfsg1-1 ii libstdc++6 8.3.0-7 Versions of packages lxqt-sudo recommends: ii lxqt-qtplugin 0.14.1~8-g02a9e71-1 ii lxqt-sudo-l10n 0.14.1-1 lxqt-sudo suggests no packages. -- no debconf information