elevated-privileges
This executable does not run with the identity of the user who executes it. It runs instead with its owner ID in the file system or with its group ID, or both.
This security-relevant setting is intentional for programs that
regularly acquire elevated privileges, such as /bin/su
,
but can be a significant risk when it the setting is not intended.
Please override if needed.
The tag is present in Lintian version 2.114.163
.
That is the most recent version we know about.
We use semantic versions.
The patch number is a commit step indicator relative to the
2.114.0
release tag in our Git
repository.
You can find the detection logic for this version at commit ea05801. For merge requests, please use the latest version in the Lintian check files/permissions.
Visibility: warning
- setuid-gid-binary
- setgid-binary
- setuid-binary