Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2011:0788 - Bug Fix Advisory
Issued:
2011-05-19
Updated:
2011-05-19

RHBA-2011:0788 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cronie bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated cronie packages that fix various bugs are now available.

Description

Cronie contains the standard UNIX daemon crond that runs specified
programs at scheduled times and related tools. It is a fork of the
original vixie-cron and has security and configuration enhancements
like the ability to use pam and SELinux.

This update fixes the following bugs:

  • The initscript output written to /var/log/boot.log contained a

double output of "OK", printed by /etc/init.d/crond and daemon. This
error has been corrected: the echo from /etc/init.d/crond is removed,
thus the output is now as expected. (BZ#615107)

  • Cronie didn't close file descriptor, which caused other

applications such as anacron that are subsequently started by cronie
to inherit the file descriptor. This caused SELinux to prevent
/bin/bash access. With this update, the file descriptor is no longer
inherited by other applications, thus SELinux no longer prevents
/bin/bash access. (BZ#624043)

  • An incorrect option in the bash script caused anacron to run daily

instead of hourly if the /var/spool/anacron/cron.daily file existed.
The error has been corrected: the bash script option is fixed and
anacron now runs once a day if the /var/spool/anacron/cron.daily file
exists. (BZ#675077)

  • RELRO flags were previously not set by default from crond. This is

now fixed so that cronie is compiled with RELRO protection enabled.
(BZ#676040)

  • The /usr/bin/crontab was set to use both setuid and setgid

permissions, but this was changed to use only setuid.
(BZ#676081)

  • Multiple code quality improvements were made, which include:
  • In src/crontab.c, mkstemp expects six X's to be replaced with

digits at the end of each filename. This fix removes the extra X's.

  • In src/security.c, ccon was not freed after a return. This

is fixed and ccon is now freed using context_free.

  • In anacron/run_job.c, fdin was tested before being initialized.

This is fixed to ensure that fdin is now initialized prior to testing.
(BZ#677364)

All users of cronie are advised to upgrade to this updated package,
which resolves these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 615107 - echos "OK" twice in init script
  • BZ - 624043 - cronie is leaking a file descriptor?
  • BZ - 675077 - anacron runs hourly instead of daily

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161
i386
cronie-1.4.4-7.el6.i686.rpm SHA-256: 7a543c76324710ed2db76af610981dc5683c6337dda8e63eb356c89212941b0f
cronie-anacron-1.4.4-7.el6.i686.rpm SHA-256: 6f0e247cdecb4b95b7b9087958496a204bede0b9ad40b13989954914745e5fb6
cronie-debuginfo-1.4.4-7.el6.i686.rpm SHA-256: a54e3a640e748ed3da88ee5ac1b8dc8026192fd02077c49d275a03eae475c81b
cronie-noanacron-1.4.4-7.el6.i686.rpm SHA-256: 9013fb3404b954678788fdf1b27b0d585b7b9d9bea6251562de4c41f5b8244cd

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161
i386
cronie-1.4.4-7.el6.i686.rpm SHA-256: 7a543c76324710ed2db76af610981dc5683c6337dda8e63eb356c89212941b0f
cronie-anacron-1.4.4-7.el6.i686.rpm SHA-256: 6f0e247cdecb4b95b7b9087958496a204bede0b9ad40b13989954914745e5fb6
cronie-debuginfo-1.4.4-7.el6.i686.rpm SHA-256: a54e3a640e748ed3da88ee5ac1b8dc8026192fd02077c49d275a03eae475c81b
cronie-noanacron-1.4.4-7.el6.i686.rpm SHA-256: 9013fb3404b954678788fdf1b27b0d585b7b9d9bea6251562de4c41f5b8244cd

Red Hat Enterprise Linux Workstation 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161
i386
cronie-1.4.4-7.el6.i686.rpm SHA-256: 7a543c76324710ed2db76af610981dc5683c6337dda8e63eb356c89212941b0f
cronie-anacron-1.4.4-7.el6.i686.rpm SHA-256: 6f0e247cdecb4b95b7b9087958496a204bede0b9ad40b13989954914745e5fb6
cronie-debuginfo-1.4.4-7.el6.i686.rpm SHA-256: a54e3a640e748ed3da88ee5ac1b8dc8026192fd02077c49d275a03eae475c81b
cronie-noanacron-1.4.4-7.el6.i686.rpm SHA-256: 9013fb3404b954678788fdf1b27b0d585b7b9d9bea6251562de4c41f5b8244cd

Red Hat Enterprise Linux Desktop 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161
i386
cronie-1.4.4-7.el6.i686.rpm SHA-256: 7a543c76324710ed2db76af610981dc5683c6337dda8e63eb356c89212941b0f
cronie-anacron-1.4.4-7.el6.i686.rpm SHA-256: 6f0e247cdecb4b95b7b9087958496a204bede0b9ad40b13989954914745e5fb6
cronie-debuginfo-1.4.4-7.el6.i686.rpm SHA-256: a54e3a640e748ed3da88ee5ac1b8dc8026192fd02077c49d275a03eae475c81b
cronie-noanacron-1.4.4-7.el6.i686.rpm SHA-256: 9013fb3404b954678788fdf1b27b0d585b7b9d9bea6251562de4c41f5b8244cd

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
s390x
cronie-1.4.4-7.el6.s390x.rpm SHA-256: 3f9bf4d596a57c1120605ac669ed2f36c133835566ecd32d124484e999ee41a9
cronie-anacron-1.4.4-7.el6.s390x.rpm SHA-256: 14ee0e60413ff8765db1b75288e2582cbb4f844ddb8ae59eaf47edb493064bda
cronie-debuginfo-1.4.4-7.el6.s390x.rpm SHA-256: f7561dc753fab4d8f02eadd9b738ffb311c751a4f34393ad0dbee0f9ea34dd61
cronie-noanacron-1.4.4-7.el6.s390x.rpm SHA-256: d28286bff166f71b06787899a2b13b22cdcaa871609a3990e2555a91b0c0cd95

Red Hat Enterprise Linux for Power, big endian 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
ppc64
cronie-1.4.4-7.el6.ppc64.rpm SHA-256: a36db648e4a61f62381472a8d1f7f617c34caf5c34679c0075581751edd54fc0
cronie-anacron-1.4.4-7.el6.ppc64.rpm SHA-256: eecc67897cde43f3367a6dd43a619535e87783ccb5e2faf940ea8cd0952c927a
cronie-debuginfo-1.4.4-7.el6.ppc64.rpm SHA-256: 1ee77c4ecf41326583d2faa8b8646959908ad16ad92cab903fe814d65b32a998
cronie-noanacron-1.4.4-7.el6.ppc64.rpm SHA-256: b21215d0cde023fc23f0dd2b3730b929709023f7c5e8b80bdd751303cc3b6df2

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161

Red Hat Enterprise Linux Server from RHUI 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
x86_64
cronie-1.4.4-7.el6.x86_64.rpm SHA-256: 21fcfebd728af8b2a790fd7e41244170abc28678a3b17254f8f30b1cb5ad81f1
cronie-anacron-1.4.4-7.el6.x86_64.rpm SHA-256: 512e9418717daa2e5003a35de78b0216101a0e02631bcb1fd68b40b0697b064c
cronie-debuginfo-1.4.4-7.el6.x86_64.rpm SHA-256: 7023943f592ded0e6ed23a1d95f069412783cbfbdbec1a76edd1718385904b60
cronie-noanacron-1.4.4-7.el6.x86_64.rpm SHA-256: fa09482f524e37db2b0e6fe164c0047820d41bebf2e0ca19d81eb4aad23c6161
i386
cronie-1.4.4-7.el6.i686.rpm SHA-256: 7a543c76324710ed2db76af610981dc5683c6337dda8e63eb356c89212941b0f
cronie-anacron-1.4.4-7.el6.i686.rpm SHA-256: 6f0e247cdecb4b95b7b9087958496a204bede0b9ad40b13989954914745e5fb6
cronie-debuginfo-1.4.4-7.el6.i686.rpm SHA-256: a54e3a640e748ed3da88ee5ac1b8dc8026192fd02077c49d275a03eae475c81b
cronie-noanacron-1.4.4-7.el6.i686.rpm SHA-256: 9013fb3404b954678788fdf1b27b0d585b7b9d9bea6251562de4c41f5b8244cd

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
cronie-1.4.4-7.el6.src.rpm SHA-256: 6c67d681886ef342e47be94ee4bfb22765df673a9b2eda1f43b972ec74582998
s390x
cronie-1.4.4-7.el6.s390x.rpm SHA-256: 3f9bf4d596a57c1120605ac669ed2f36c133835566ecd32d124484e999ee41a9
cronie-anacron-1.4.4-7.el6.s390x.rpm SHA-256: 14ee0e60413ff8765db1b75288e2582cbb4f844ddb8ae59eaf47edb493064bda
cronie-debuginfo-1.4.4-7.el6.s390x.rpm SHA-256: f7561dc753fab4d8f02eadd9b738ffb311c751a4f34393ad0dbee0f9ea34dd61
cronie-noanacron-1.4.4-7.el6.s390x.rpm SHA-256: d28286bff166f71b06787899a2b13b22cdcaa871609a3990e2555a91b0c0cd95

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter