System Programming: Can D binaries be set suid root without the risk of unwanted privilege escalation?

Forum User forumuser at example.com
Sun Feb 15 09:53:16 UTC 2026


What I mean is: Are there less well-known environment variables 
or special conditions in the execution environment (e.g. resource 
shortage) which may trigger the dynamic loading of foreign code 
or which execute alternative code paths (e.g. in the Garbge 
Collector, debug facilities) such that the actual user of a 
setuid root binary may create or delete files as root or execute 
other operations they usually cannot execute?


More information about the Digitalmars-d mailing list