Bug 202688 - CVE-2006-3083 krb5 multiple unsafe setuid usage
Summary: CVE-2006-3083 krb5 multiple unsafe setuid usage
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: krb5
Version: 6
Hardware: All
OS: Linux
medium
high
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Brian Brock
URL:
Whiteboard: source=mit,reported=20060706,impact=i...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-08-15 20:30 UTC by Mark J. Cox
Modified: 2007-11-30 22:11 UTC (History)
2 users (show)

Fixed In Version: 1.5-5
Clone Of:
Environment:
Last Closed: 2006-08-15 20:32:48 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Mark J. Cox 2006-08-15 20:30:32 UTC
This issue needs fixing as it affects FC6test2.

+++ This bug was initially created as a clone of Bug #197818 +++

krb5 multiple unsafe setuid usage

krb5 contains several unsafe uses of setuid.  This is a problem on
RHEL4 due to process restrictions in the 2.6 kernel.

Theses issues do not affect RHEL3 or RHEL2.1 since setuid does not
fail due to user limits.

The advisory from MIT also mentions CVE-2006-3084.  That issue
describes issues when calling seteuid() fails.  The seteuid() function
on all versions of the linux kernel will not fail due to user limits.


Note You need to log in before you can comment on or make changes to this bug.