https://bugs.kde.org/show_bug.cgi?id=406673
Bug ID: 406673 Summary: Security: Sudo Restriction Bypass Product: kate Version: Git Platform: Debian testing OS: Linux Status: REPORTED Severity: critical Priority: NOR Component: general Assignee: kwrite-bugs-n...@kde.org Reporter: hl1...@protonmail.com Target Milestone: --- SUMMARY When kate is ran, it checks if SUDO_USER is empty, and if it is not, kate exits with a message stating due to security concerns running as sudo is disabled. However, one can continue to run kate as sudo very easily. STEPS TO REPRODUCE 1. sudo bash -c "unset SUDO_USER && kate" OBSERVED RESULT It runs under sudo EXPECTED RESULT It would exit without running under sudo ADDITIONAL INFORMATION I am marking it as critical initially because I am unsure of the security implications of running under sudo in this way and whether the security concerns are mitigated via this special procedure or if the security concerns are still present. -- You are receiving this mail because: You are watching all bug changes.