Lintian Reports

W non-standard-setuid-executable-perm

All reports of non-standard-setuid-executable-perm for the archive. The extended description of this tag is:

The file is setuid or setgid and has a mode different from any of 2755, 4755, 4754, or 6755. Any other permissions on setuid executables is probably a bug. In particular, removing root write privileges serves no purpose, group-writable setuid or setgid executables are probably bad ideas, and setgid executables that are not world-executable serve little purpose.

Refer to Debian Policy Manual section 10.9 (Permissions and owners) for details.

Severity: normal, Certainty: certain

Check: files, Type: binary, udeb

Evolution of the non-standard-setuid-executable-perm Lintian tag over the past 366 days:

The beforementioned graph for the non-standard-setuid-executable-perm tag

Emitted (non-overridden): 4, overridden: 4, total: 8

The package names link to the relevant maintainer page and the corresponding report for the source package. The links go to the full maintainer report page, which includes info and experimental tags and overridden tags, rather than the default page that shows only errors and warnings.

libgtk3-nocsd0 3-1 (binary) overridden

nwall 1.32+debian-4.2+b3 (binary) overridden

sdate 0.4+nmu1 (binary)

zlibc 0.9k-4.3 (binary)