Originally posted by kubicle
View Post
1) I am still running Linux Mint 17.3 KDE in one of my systems, which is still officially supported until 2019. The vulnerability is still there in KDE 4 but it has not been patched. I can run Dolphin as sudo. I haven't heard anyone complain about that. If it was such a big deal perhaps someone would have said something.
2) There is an actual backlash against removing sudo functionality from Dolphin (while still unable to prove the final KIO policy fix). From my point of view that patch did more harm than good.
3) People who would create a backlash about that have much bigger problems to think about: Vulnerabilities such as Spectre/Meltdown etc, their attack surface (be it Kernel or whatever other software stack they run on their server). For these people there is also the option to run an Ubuntu flavor without a GUI. The KDE dev responsible for this should just spare us common folks.
Originally posted by kubicle
View Post
https://bugs.kde.org/show_bug.cgi?id=179678
Quote from the blog post you provided:
"I am also aware that if you run an application which is malicious you are already owned. I think that we should protect nevertheless."
By the way, thanks to everyone providing alternatives. Much appreciated. There are some interesting choices there.
In my case though, this is not about just editing files. Sometimes I just run dolphin in root in order to quickly unmount a drive. I'm not a terminal expert and to be frank I don't care to become one.
If I can use Thunar, or Konqueror with sudo mode I will still do that, even if I am still "vulnerable". These are also GUI apps, right? Why didn't their developers remove sudo access as well?
Sorry if I sound cranky, I am. A bit. This is the next LTS version of Kubuntu we're talking about, it has to be better than that!
Anyway, I feel better now. :|
Comment