This issue needs fixing as it affects FC6test2.
+++ This bug was initially created as a clone of Bug #197818 +++
krb5 multiple unsafe setuid usage
krb5 contains several unsafe uses of setuid. This is a problem on
RHEL4 due to process restrictions in the 2.6 kernel.
Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not
fail due to user limits.
The advisory from MIT also mentions CVE-2006-3084. That issue
describes issues when calling seteuid() fails. The seteuid() function
on all versions of the linux kernel will not fail due to user limits.