Bug 202688

Summary: CVE-2006-3083 krb5 multiple unsafe setuid usage
Product: [Fedora] Fedora Reporter: Mark J. Cox (Product Security) <mjc>
Component: krb5Assignee: Nalin Dahyabhai <nalin>
Status: CLOSED RAWHIDE QA Contact: Brian Brock <bbrock>
Severity: high Docs Contact:
Priority: medium    
Version: 6CC: jplans, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=mit,reported=20060706,impact=important,embargo=20060808
Fixed In Version: 1.5-5 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-08-15 16:32:48 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Description Mark J. Cox (Product Security) 2006-08-15 16:30:32 EDT
This issue needs fixing as it affects FC6test2.

+++ This bug was initially created as a clone of Bug #197818 +++

krb5 multiple unsafe setuid usage

krb5 contains several unsafe uses of setuid.  This is a problem on
RHEL4 due to process restrictions in the 2.6 kernel.

Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not
fail due to user limits.

The advisory from MIT also mentions CVE-2006-3084.  That issue
describes issues when calling seteuid() fails.  The seteuid() function
on all versions of the linux kernel will not fail due to user limits.