The issue isn't if %n works, but if %n is in writable memory: $ kdesudo echo "%x%x%n" *** %n in writable segment detected ***
Test programs to see this need to have writable memory, and be compiled -O2 (the default for kdesudo). It's also unimportant because there are no privileges yet when the expansion occurs. The output is being run as root, that's true, but again, the user must know the root password to have this happen, so there's no escalation of existing privileges. The case for user- assisted attacks is very unlikely. (Though perhaps I'm just being uncreative when it comes to %-expansions.) This is a bug, and needs to be fixed, though. I'll go poke the maintainer again. -- kdesudo crashed with SIGSEGV in strlen() https://bugs.launchpad.net/bugs/281877 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs