Bug 202688 - CVE-2006-3083 krb5 multiple unsafe setuid usage
CVE-2006-3083 krb5 multiple unsafe setuid usage
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: krb5 (Show other bugs)
6
All Linux
medium Severity high
: ---
: ---
Assigned To: Nalin Dahyabhai
Brian Brock
source=mit,reported=20060706,impact=i...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2006-08-15 16:30 EDT by Mark J. Cox (Product Security)
Modified: 2007-11-30 17:11 EST (History)
2 users (show)

See Also:
Fixed In Version: 1.5-5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2006-08-15 16:32:48 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Mark J. Cox (Product Security) 2006-08-15 16:30:32 EDT
This issue needs fixing as it affects FC6test2.

+++ This bug was initially created as a clone of Bug #197818 +++

krb5 multiple unsafe setuid usage

krb5 contains several unsafe uses of setuid.  This is a problem on
RHEL4 due to process restrictions in the 2.6 kernel.

Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not
fail due to user limits.

The advisory from MIT also mentions CVE-2006-3084.  That issue
describes issues when calling seteuid() fails.  The seteuid() function
on all versions of the linux kernel will not fail due to user limits.

Note You need to log in before you can comment on or make changes to this bug.