System Programming: Can D binaries be set suid root without the risk of unwanted privilege escalation?
Forum User
forumuser at example.com
Sun Feb 15 09:53:16 UTC 2026
What I mean is: Are there less well-known environment variables
or special conditions in the execution environment (e.g. resource
shortage) which may trigger the dynamic loading of foreign code
or which execute alternative code paths (e.g. in the Garbge
Collector, debug facilities) such that the actual user of a
setuid root binary may create or delete files as root or execute
other operations they usually cannot execute?
More information about the Digitalmars-d
mailing list