krb5 multiple unsafe setuid usage krb5 contains several unsafe uses of setuid. This is a problem on RHEL4 due to process restrictions in the 2.6 kernel. Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not fail due to user limits. The advisory from MIT also mentions CVE-2006-3084. That issue describes issues when calling seteuid() fails. The seteuid() function on all versions of the linux kernel will not fail due to user limits.
Created attachment 132010 [details] Patch from upstream
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0612.html