summaryrefslogtreecommitdiffstats
path: root/testing/source/vtown/kde/patch/kate/kate_runasroot.patch
diff options
context:
space:
mode:
Diffstat (limited to 'testing/source/vtown/kde/patch/kate/kate_runasroot.patch')
-rw-r--r--testing/source/vtown/kde/patch/kate/kate_runasroot.patch45
1 files changed, 45 insertions, 0 deletions
diff --git a/testing/source/vtown/kde/patch/kate/kate_runasroot.patch b/testing/source/vtown/kde/patch/kate/kate_runasroot.patch
new file mode 100644
index 000000000..f549fc342
--- /dev/null
+++ b/testing/source/vtown/kde/patch/kate/kate_runasroot.patch
@@ -0,0 +1,45 @@
+The user gets to decide whether she wants to run kate as root.
+Please developers, do not presume that a Slackware user is dumb.
+
+diff -uar kate-19.04.1.orig/kate/main.cpp kate-19.04.1/kate/main.cpp
+--- kate-19.04.1.orig/kate/main.cpp 2019-05-02 12:44:53.000000000 +0200
++++ kate-19.04.1/kate/main.cpp 2019-05-08 21:26:07.196338144 +0200
+@@ -59,14 +59,12 @@
+ int main(int argc, char **argv)
+ {
+ #ifndef Q_OS_WIN
+- // Prohibit using sudo or kdesu (but allow using the root user directly)
++ // Warn using sudo or kdesu (but allow using the root user directly)
+ if (getuid() == 0) {
+ if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
+- std::cout << "Executing Kate with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing Kate with sudo is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
+- std::cout << "Executing Kate with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing Kate with kdesu is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ }
+ }
+ #endif
+diff -uar kate-19.04.1.orig/kwrite/main.cpp kate-19.04.1/kwrite/main.cpp
+--- kate-19.04.1.orig/kwrite/main.cpp 2019-05-02 12:44:53.000000000 +0200
++++ kate-19.04.1/kwrite/main.cpp 2019-05-08 21:27:52.034134472 +0200
+@@ -51,14 +51,12 @@
+ extern "C" Q_DECL_EXPORT int main(int argc, char **argv)
+ {
+ #ifndef Q_OS_WIN
+- // Prohibit using sudo or kdesu (but allow using the root user directly)
++ // Warn using sudo or kdesu (but allow using the root user directly)
+ if (getuid() == 0) {
+ if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
+- std::cout << "Executing KWrite with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing KWrite with sudo is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
+- std::cout << "Executing KWrite with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing KWrite with kdesu is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ }
+ }
+ #endif