https://bugs.kde.org/show_bug.cgi?id=406673

            Bug ID: 406673
           Summary: Security: Sudo Restriction Bypass
           Product: kate
           Version: Git
          Platform: Debian testing
                OS: Linux
            Status: REPORTED
          Severity: critical
          Priority: NOR
         Component: general
          Assignee: kwrite-bugs-n...@kde.org
          Reporter: hl1...@protonmail.com
  Target Milestone: ---

SUMMARY
When kate is ran, it checks if SUDO_USER is empty, and if it is not, kate exits
with a message stating due to security concerns running as sudo is disabled.
However, one can continue to run kate as sudo very easily.

STEPS TO REPRODUCE
1. sudo bash -c "unset SUDO_USER && kate"

OBSERVED RESULT
It runs under sudo

EXPECTED RESULT
It would exit without running under sudo

ADDITIONAL INFORMATION

I am marking it as critical initially because I am unsure of the security
implications of running under sudo in this way and whether the security
concerns are mitigated via this special procedure or if the security concerns
are still present.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to