Bug 202688 - CVE-2006-3083 krb5 multiple unsafe setuid usage
Summary: CVE-2006-3083 krb5 multiple unsafe setuid usage
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: krb5
Version: 6
Hardware: All
OS: Linux
medium
high
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Brian Brock
URL:
Whiteboard: source=mit,reported=20060706,impact=i...
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-08-15 20:30 UTC by Mark J. Cox
Modified: 2007-11-30 22:11 UTC (History)
2 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2006-08-15 20:32:48 UTC


Attachments (Terms of Use)

Description Mark J. Cox 2006-08-15 20:30:32 UTC
This issue needs fixing as it affects FC6test2.

+++ This bug was initially created as a clone of Bug #197818 +++

krb5 multiple unsafe setuid usage

krb5 contains several unsafe uses of setuid.  This is a problem on
RHEL4 due to process restrictions in the 2.6 kernel.

Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not
fail due to user limits.

The advisory from MIT also mentions CVE-2006-3084.  That issue
describes issues when calling seteuid() fails.  The seteuid() function
on all versions of the linux kernel will not fail due to user limits.


Note You need to log in before you can comment on or make changes to this bug.