Description of problem: The krb5_aname_to_localname() library function contains multiple buffer overflows which could be exploited to gain unauthorized root access. Only configurations which include auth_to_local_names or auth_to_local directives (neither of which are included in default configurations) are vulnerable.
the errata that were just issued for this for fc1 and fc2, did they apply the first patch or the second from the mit announcement. they issued a correction to the patch and I wanted to make sure the bug was not present. see http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt about it
*** Bug 125019 has been marked as a duplicate of this bug. ***
(bug #125019 was not a duplicate)
Seth: the updated patch (revision 2004-06-02) was included in both updates for Fedora.
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-236.html