Security update for cronie

SUSE Security Update: Security update for cronie
Announcement ID: SUSE-SU-2019:1389-1
Rating: low
References: #1128935 #1128937 #1130746 #1133100
Cross-References: CVE-2019-9704 CVE-2019-9705
Affected Products:
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
  • SUSE Linux Enterprise Module for Basesystem 15

An update that solves two vulnerabilities and has two fixes is now available.

Description:

This update for cronie fixes the following issues:
Security issues fixed:

  • CVE-2019-9704: Fixed an insufficient check in the return value of calloc which could allow a local user to create Denial of Service by crashing the daemon (bsc#1128937).
  • CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to exhaust the memory resulting in Denial of Service (bsc#1128935).

Bug fixes:
  • Manual start of cron is possible even when it's already started using systemd (bsc#1133100).
  • Cron schedules only one job of crontab (bsc#1130746).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1389=1
  • SUSE Linux Enterprise Module for Basesystem 15:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1389=1

Package List:

  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
    • cronie-anacron-1.5.1-6.7.1
    • cronie-anacron-debuginfo-1.5.1-6.7.1
    • cronie-debuginfo-1.5.1-6.7.1
    • cronie-debugsource-1.5.1-6.7.1
  • SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):
    • cron-4.2-6.7.1
    • cronie-1.5.1-6.7.1
    • cronie-debuginfo-1.5.1-6.7.1
    • cronie-debugsource-1.5.1-6.7.1

References: