Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHBA-2013:1681 - Bug Fix Advisory
Issued:
2013-11-20
Updated:
2013-11-20

RHBA-2013:1681 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cronie bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Topic

Updated cronie packages that fix several bugs and add two enhancements are now
available for Red Hat Enterprise Linux 6.

Description

Cronie contains the standard UNIX daemon crond that runs specified programs at
scheduled times and related tools. It is a fork of the original vixie-cron and
has security and configuration enhancements like the ability to use pam and
SELinux.

This update fixes the following bugs:

  • Previously, the crond deamon did not drop data about user privileges before
    calling the popen() system function. Consequently, warnings about changing
    privileges were written to the /var/log/crond file when the function was invoked
    by the non-root user. With this update, crond has been modified to drop user
    privileges before calling popen(). As a result, warnings are no longer logged in
    this scenario. (BZ#697485)
  • With this update, file permissions of cron configuration files have been
    changed to be readable only by the root user. (BZ#706979)
  • Prior to this update, the definition of restart in the cron init file was
    incorrect. Consequently, a failure was incorrectly reported when restarting the
    crond daemon. The init file has been fixed and the redundant failure message is
    no longer displayed after crond restart. (BZ#733697)
  • Cron jobs of users with home directories mounted on a Lightweight Directory
    Access Protocol (LDAP) server or Network File System (NFS) were often refused
    because jobs were marked as orphaned (typically due to a temporary NSS lookup
    failure, when NIS and LDAP servers were unreachable). With this update, a
    database of orphans is created, and cron jobs are performed as expected.
    (BZ#738232)
  • With this update, obsolete comments have been removed from the
    /etc/cron.hourly/0anacron configuration file. (BZ#743473)
  • Due to a bug in cron's support for time zones, planned jobs were executed
    multiple times. Effects of this bug were visible only during the spring change
    of time. This bug has been fixed and jobs are now executed correctly during the
    time change. (BZ#821046, BZ#995089)
  • With this update, an incorrect example showing the anacron table setup has
    been fixed in the anacrontab man page. (BZ#887859)
  • Previously, the crond daemon did not check for existing locks for daemon.
    Consequently, multiple instances of crond could run simultaneously. The locking
    mechanism has been updated and running multiple instances of cron at once is no
    longer possible. (BZ#919440)
  • Prior to this update, the $LANG setting was not read by the crond daemon.
    Consequently, cron jobs were not run with the system-wide $LANG setting. This
    bug has been fixed and $LANG is now used by cron jobs as expected. (BZ#985888)
  • Previously, the crond daemon used the putenv system call, which could have
    caused crond to terminate unexpectedly with a segmentation fault. With this
    update, putenv() has been replaced with the setenv() system call, thus
    preventing the segmentation fault. (BZ#985893)
  • Prior to this update, the PATH variable could be set by cron or in crontable,
    but could not be changed by a PAM setting. With this update, PATH can be altered
    by PAM setting. As a result, PATH can now be inherited from the environment if
    the "-P" option is used. (BZ#990710)
  • Previously, an incorrect error code was returned when non-root user tried to
    restart the crond daemon. With this update, a correct code is returned in the
    described case. (BZ#1006869)

In addition, this update adds the following enhancements:

  • This update adds the RANDOM_DELAY variable that allows delaying job startups
    by random amount of minutes with upper limit specified by the variable. The
    random scaling factor is determined during the crond daemon startup so it
    remains constant for the whole run time of the daemon. (BZ#829910)
  • With this update, the CRON_CORRECT_MAIL_HEADER environment variable in the
    /etc/crond/sysconfig configuration file has been updated. With this variable
    enabled, cron now sends emails with headers in RFC compliant format. (BZ#922829)

Users of cronie are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 697485 - cronie doesn't drop privileges before popen
  • BZ - 706979 - config file permissions are world readable
  • BZ - 733697 - Service restart needlessly reports failure
  • BZ - 743473 - Confusing comments in /etc/cron.hourly/0anacron
  • BZ - 887859 - Incorrect example in anacrontab manpage
  • BZ - 919440 - cronie: prevent new crond process when already running
  • BZ - 985888 - cronie drops $LANG and never passes it on to jobs run
  • BZ - 985893 - do not use putenv
  • BZ - 1006869 - init script: service restart under the nonroot changed behaviour, it returns 1 instead of 4

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
x86_64
cronie-1.4.4-12.el6.x86_64.rpm SHA-256: 617ead81eb3c340c02312525aee81a0dd987bd5ac4866f95b8aa45c606078e93
cronie-anacron-1.4.4-12.el6.x86_64.rpm SHA-256: 31a389510f119ad8d734d4ddbd2f8f386af0c59ff45068b48b43972e88edfdc2
cronie-debuginfo-1.4.4-12.el6.x86_64.rpm SHA-256: 15dd7d99e0c911a144efe01166b2973421f1b0ea736a547ea88085e814603259
cronie-noanacron-1.4.4-12.el6.x86_64.rpm SHA-256: 98bba4fc4c0db5094e06a3dc53a38009254fff634bfc6911b8df63a4ef03162c
i386
cronie-1.4.4-12.el6.i686.rpm SHA-256: b49da6d3e2d1b8eb4c9e34ac68c41dbf3757ff3e00245d7d56d1b46ef5c2d6ae
cronie-anacron-1.4.4-12.el6.i686.rpm SHA-256: 965ac17f445fd67bf62570bb7600d744568b901b697fe6d51e9f0c6d4ef0800e
cronie-debuginfo-1.4.4-12.el6.i686.rpm SHA-256: 3068ae542e8b71becf039cd99f3f5b9def5947a204f77168869ca29472d0047a
cronie-noanacron-1.4.4-12.el6.i686.rpm SHA-256: c4ed72cd0771fdfd7cc92b00300f3ee49b7576deeda723f242343d00fa1f8160

Red Hat Enterprise Linux Workstation 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
x86_64
cronie-1.4.4-12.el6.x86_64.rpm SHA-256: 617ead81eb3c340c02312525aee81a0dd987bd5ac4866f95b8aa45c606078e93
cronie-anacron-1.4.4-12.el6.x86_64.rpm SHA-256: 31a389510f119ad8d734d4ddbd2f8f386af0c59ff45068b48b43972e88edfdc2
cronie-debuginfo-1.4.4-12.el6.x86_64.rpm SHA-256: 15dd7d99e0c911a144efe01166b2973421f1b0ea736a547ea88085e814603259
cronie-noanacron-1.4.4-12.el6.x86_64.rpm SHA-256: 98bba4fc4c0db5094e06a3dc53a38009254fff634bfc6911b8df63a4ef03162c
i386
cronie-1.4.4-12.el6.i686.rpm SHA-256: b49da6d3e2d1b8eb4c9e34ac68c41dbf3757ff3e00245d7d56d1b46ef5c2d6ae
cronie-anacron-1.4.4-12.el6.i686.rpm SHA-256: 965ac17f445fd67bf62570bb7600d744568b901b697fe6d51e9f0c6d4ef0800e
cronie-debuginfo-1.4.4-12.el6.i686.rpm SHA-256: 3068ae542e8b71becf039cd99f3f5b9def5947a204f77168869ca29472d0047a
cronie-noanacron-1.4.4-12.el6.i686.rpm SHA-256: c4ed72cd0771fdfd7cc92b00300f3ee49b7576deeda723f242343d00fa1f8160

Red Hat Enterprise Linux Desktop 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
x86_64
cronie-1.4.4-12.el6.x86_64.rpm SHA-256: 617ead81eb3c340c02312525aee81a0dd987bd5ac4866f95b8aa45c606078e93
cronie-anacron-1.4.4-12.el6.x86_64.rpm SHA-256: 31a389510f119ad8d734d4ddbd2f8f386af0c59ff45068b48b43972e88edfdc2
cronie-debuginfo-1.4.4-12.el6.x86_64.rpm SHA-256: 15dd7d99e0c911a144efe01166b2973421f1b0ea736a547ea88085e814603259
cronie-noanacron-1.4.4-12.el6.x86_64.rpm SHA-256: 98bba4fc4c0db5094e06a3dc53a38009254fff634bfc6911b8df63a4ef03162c
i386
cronie-1.4.4-12.el6.i686.rpm SHA-256: b49da6d3e2d1b8eb4c9e34ac68c41dbf3757ff3e00245d7d56d1b46ef5c2d6ae
cronie-anacron-1.4.4-12.el6.i686.rpm SHA-256: 965ac17f445fd67bf62570bb7600d744568b901b697fe6d51e9f0c6d4ef0800e
cronie-debuginfo-1.4.4-12.el6.i686.rpm SHA-256: 3068ae542e8b71becf039cd99f3f5b9def5947a204f77168869ca29472d0047a
cronie-noanacron-1.4.4-12.el6.i686.rpm SHA-256: c4ed72cd0771fdfd7cc92b00300f3ee49b7576deeda723f242343d00fa1f8160

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
s390x
cronie-1.4.4-12.el6.s390x.rpm SHA-256: 2fc42fb74ba78c94c4862334a9f658ae6aa133bfc3aa09b2c69ec8958b7c729c
cronie-anacron-1.4.4-12.el6.s390x.rpm SHA-256: bb7d9afb01793ab30566e98a9fa60bac7011a70a5c74d783f6ac9011f7f0dc55
cronie-debuginfo-1.4.4-12.el6.s390x.rpm SHA-256: 0c4b45caca4784e3bacd5c51b985f44cded3095f5ea55ed3de2071bf4b16bb22
cronie-noanacron-1.4.4-12.el6.s390x.rpm SHA-256: d5967979047051af1666cf76e4acc86858aad8a48fab6aa63354af2ba63a6861

Red Hat Enterprise Linux for Power, big endian 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
ppc64
cronie-1.4.4-12.el6.ppc64.rpm SHA-256: fd5743bbc3e482d157aa7fc034ae7b78a50c521053abd35e82f42a07f945289e
cronie-anacron-1.4.4-12.el6.ppc64.rpm SHA-256: d0be57778eeeea5a93131f5d377d0deb91b6f2d465025ff93e8327589f9effa4
cronie-debuginfo-1.4.4-12.el6.ppc64.rpm SHA-256: 8e083270f074d566e71623019eab5a374c1cc97e1bd67d00d838ea9d09a174a9
cronie-noanacron-1.4.4-12.el6.ppc64.rpm SHA-256: 40604f295cdfe35f9b410d337495b5e0fa4350a8b43a0ce5b19627d732bdb92e

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
x86_64
cronie-1.4.4-12.el6.x86_64.rpm SHA-256: 617ead81eb3c340c02312525aee81a0dd987bd5ac4866f95b8aa45c606078e93
cronie-anacron-1.4.4-12.el6.x86_64.rpm SHA-256: 31a389510f119ad8d734d4ddbd2f8f386af0c59ff45068b48b43972e88edfdc2
cronie-debuginfo-1.4.4-12.el6.x86_64.rpm SHA-256: 15dd7d99e0c911a144efe01166b2973421f1b0ea736a547ea88085e814603259
cronie-noanacron-1.4.4-12.el6.x86_64.rpm SHA-256: 98bba4fc4c0db5094e06a3dc53a38009254fff634bfc6911b8df63a4ef03162c

Red Hat Enterprise Linux Server from RHUI 6

SRPM
cronie-1.4.4-12.el6.src.rpm SHA-256: a35a24feffaec3dfb47ef7f847cc881d1a5d797c0e78550f139bc44f84b46dd2
x86_64
cronie-1.4.4-12.el6.x86_64.rpm SHA-256: 617ead81eb3c340c02312525aee81a0dd987bd5ac4866f95b8aa45c606078e93
cronie-anacron-1.4.4-12.el6.x86_64.rpm SHA-256: 31a389510f119ad8d734d4ddbd2f8f386af0c59ff45068b48b43972e88edfdc2
cronie-debuginfo-1.4.4-12.el6.x86_64.rpm SHA-256: 15dd7d99e0c911a144efe01166b2973421f1b0ea736a547ea88085e814603259
cronie-noanacron-1.4.4-12.el6.x86_64.rpm SHA-256: 98bba4fc4c0db5094e06a3dc53a38009254fff634bfc6911b8df63a4ef03162c
i386
cronie-1.4.4-12.el6.i686.rpm SHA-256: b49da6d3e2d1b8eb4c9e34ac68c41dbf3757ff3e00245d7d56d1b46ef5c2d6ae
cronie-anacron-1.4.4-12.el6.i686.rpm SHA-256: 965ac17f445fd67bf62570bb7600d744568b901b697fe6d51e9f0c6d4ef0800e
cronie-debuginfo-1.4.4-12.el6.i686.rpm SHA-256: 3068ae542e8b71becf039cd99f3f5b9def5947a204f77168869ca29472d0047a
cronie-noanacron-1.4.4-12.el6.i686.rpm SHA-256: c4ed72cd0771fdfd7cc92b00300f3ee49b7576deeda723f242343d00fa1f8160

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+