|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2019:1389-2)|
|Summary:||The remote host is missing an update for the 'cronie' package(s) announced via the SUSE-SU-2019:1389-2 advisory.|
The remote host is missing an update for the 'cronie' package(s) announced via the SUSE-SU-2019:1389-2 advisory.
This update for cronie fixes the following issues:
Security issues fixed:
CVE-2019-9704: Fixed an insufficient check in the return value of calloc
which could allow a local user to create Denial of Service by crashing
the daemon (bsc#1128937).
CVE-2019-9705: Fixed an implementation vulnerability which could allow a
local user to exhaust the memory resulting in Denial of Service
Manual start of cron is possible even when it's already started using
Cron schedules only one job of crontab (bsc#1130746).
'cronie' package(s) on SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP1
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2019-9704|
BugTraq ID: 107373
Common Vulnerability Exposure (CVE) ID: CVE-2019-9705
BugTraq ID: 107378
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.