Package name
tmpwatch
Date
2000-10-07
Advisory ID
MDKSA-2000:056
Affected versions
6.1 i586 , 6.0 i586 , 7.0 i586 , 7.1 i586

Problem description

Previous versions of tmpwatch contained a local denial of service and root exploits. This is due to using the fork() command to recursively process subdirectories which would allow a local user to perform a denial of service attack.

Updated packages

6.1 i586

 04b86f78b1bf908219c5ddc94767c7a8  6.1/RPMS/tmpwatch-2.6.2-1mdk.i586.rpm
93541933fc92134a4954db3decbe2b31  6.1/SRPMS/tmpwatch-2.6.2-1mdk.src.rpm

6.0 i586

 d6e7442f4c3a9af30e9158e7ae9ecf72  6.0/RPMS/tmpwatch-2.6.2-1mdk.i586.rpm
93541933fc92134a4954db3decbe2b31  6.0/SRPMS/tmpwatch-2.6.2-1mdk.src.rpm

7.0 i586

 07267b2907b9e9454a967c4323b17f17  7.0/RPMS/tmpwatch-2.6.2-1mdk.i586.rpm
93541933fc92134a4954db3decbe2b31  7.0/SRPMS/tmpwatch-2.6.2-1mdk.src.rpm

7.1 i586

 04e2717f14f0b4f8f991ea9cc0926b2e  7.1/RPMS/tmpwatch-2.6.2-1mdk.i586.rpm
93541933fc92134a4954db3decbe2b31  7.1/SRPMS/tmpwatch-2.6.2-1mdk.src.rpm