Lintian ReportsBETA

elevated-privileges

This executable does not run with the identity of the user who executes it. It runs instead with its owner ID in the file system or with its group ID, or both.

This security-relevant setting is intentional for programs that regularly acquire elevated privileges, such as /bin/su, but can be a significant risk when it the setting is not intended.

Please override if needed.

The tag is present in Lintian version 2.114.163. That is the most recent version we know about.

We use semantic versions. The patch number is a commit step indicator relative to the 2.114.0 release tag in our Git repository.

You can find the detection logic for this version at commit ea05801. For merge requests, please use the latest version in the Lintian check files/permissions.

Visibility: warning

Renamed from:
  • setuid-gid-binary
  • setgid-binary
  • setuid-binary

The following 95 source packages in the archive triggered the tag 171 times (in any Lintian version).

We found 5 overrides. The tag performed 97% of the time.