Updated at packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

The “at” packages provide the “at” and “batch” commands, which are used to readcommands from standard input or from a specified file. The “at” command allowsyou to specify that a command will be run at a particular time. The “batch”command will execute commands when the system load levels drop to a particularlevel. Both commands use /bin/sh.This update fixes the following bug:* Due to a security issue fix in Bash, “at” jobs failed to run because the “atd”daemon exported environment variables with an incorrect syntax to the Bash shellrunning the jobs. With this update, “atd” filters out environment variables thatcannot be parsed by the Bash shell, thus allowing the “at” jobs to run properly.(BZ#1148730)Users of at are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
IA-32:
at-3.1.10-44.el6_5.2.i686.rpm
    MD5: cfa91fd2e5fe0ed9215ecb4437ffded9SHA-256: a80f89ab76683e38658ad1c96e0c4675e9bc49a5f536d5e10031dd5b0f882b3d
at-debuginfo-3.1.10-44.el6_5.2.i686.rpm
    MD5: 0b5c50980f1740ab4eb876fdd1257286SHA-256: ceb1a2e2023df9cb5d24238872f981227591cd4fb912eb4cf3aad7d29e24b13b
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
IA-32:
at-3.1.10-44.el6_5.2.i686.rpm
    MD5: cfa91fd2e5fe0ed9215ecb4437ffded9SHA-256: a80f89ab76683e38658ad1c96e0c4675e9bc49a5f536d5e10031dd5b0f882b3d
at-debuginfo-3.1.10-44.el6_5.2.i686.rpm
    MD5: 0b5c50980f1740ab4eb876fdd1257286SHA-256: ceb1a2e2023df9cb5d24238872f981227591cd4fb912eb4cf3aad7d29e24b13b
 
PPC:
at-3.1.10-44.el6_5.2.ppc64.rpm
    MD5: d9658647d1e6b73705bf869c5c1623d7SHA-256: 7c2d9faece6f7f37b802ac1eba2a4138ffe7478ea4436b5cf4f44e3dbda9c669
at-debuginfo-3.1.10-44.el6_5.2.ppc64.rpm
    MD5: 63d18d43e46917d74a81e001a6c5b60fSHA-256: 36529c308e1b6e40f567562d10e963c261ad6ca804bee2be89e196bb5f049a45
 
s390x:
at-3.1.10-44.el6_5.2.s390x.rpm
    MD5: 51550e677c41b575e7faf97af8be727cSHA-256: b306c142992ce4a1dccbd95401dbee5c58d82fd6ddfe9505c5f716fb31ad48a4
at-debuginfo-3.1.10-44.el6_5.2.s390x.rpm
    MD5: 464b21063b9eb253ae28fe5b6526ae08SHA-256: 37105a43f94b8b05cd2c8e50d868d7b93f30de9fc37cd4c1e83beb6a74aaf95d
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
IA-32:
at-3.1.10-44.el6_5.2.i686.rpm
    MD5: cfa91fd2e5fe0ed9215ecb4437ffded9SHA-256: a80f89ab76683e38658ad1c96e0c4675e9bc49a5f536d5e10031dd5b0f882b3d
at-debuginfo-3.1.10-44.el6_5.2.i686.rpm
    MD5: 0b5c50980f1740ab4eb876fdd1257286SHA-256: ceb1a2e2023df9cb5d24238872f981227591cd4fb912eb4cf3aad7d29e24b13b
 
PPC:
at-3.1.10-44.el6_5.2.ppc64.rpm
    MD5: d9658647d1e6b73705bf869c5c1623d7SHA-256: 7c2d9faece6f7f37b802ac1eba2a4138ffe7478ea4436b5cf4f44e3dbda9c669
at-debuginfo-3.1.10-44.el6_5.2.ppc64.rpm
    MD5: 63d18d43e46917d74a81e001a6c5b60fSHA-256: 36529c308e1b6e40f567562d10e963c261ad6ca804bee2be89e196bb5f049a45
 
s390x:
at-3.1.10-44.el6_5.2.s390x.rpm
    MD5: 51550e677c41b575e7faf97af8be727cSHA-256: b306c142992ce4a1dccbd95401dbee5c58d82fd6ddfe9505c5f716fb31ad48a4
at-debuginfo-3.1.10-44.el6_5.2.s390x.rpm
    MD5: 464b21063b9eb253ae28fe5b6526ae08SHA-256: 37105a43f94b8b05cd2c8e50d868d7b93f30de9fc37cd4c1e83beb6a74aaf95d
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
at-3.1.10-44.el6_5.2.src.rpm
    MD5: a61c229ec0717365c5c15fbe6ff1d26fSHA-256: 49ac9ad51cf709f65844114fd690954898661fff4ce2721ffdcf59d55b883859
 
IA-32:
at-3.1.10-44.el6_5.2.i686.rpm
    MD5: cfa91fd2e5fe0ed9215ecb4437ffded9SHA-256: a80f89ab76683e38658ad1c96e0c4675e9bc49a5f536d5e10031dd5b0f882b3d
at-debuginfo-3.1.10-44.el6_5.2.i686.rpm
    MD5: 0b5c50980f1740ab4eb876fdd1257286SHA-256: ceb1a2e2023df9cb5d24238872f981227591cd4fb912eb4cf3aad7d29e24b13b
 
x86_64:
at-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: 4dd2ae5cb12b71d8a8562e5eed21a034SHA-256: 14d7855c2b9ed4194c9c8468eb56d72cefc06e57e52163c318ba79a7cbe9766c
at-debuginfo-3.1.10-44.el6_5.2.x86_64.rpm
    MD5: cfa39000cbdb0b416c9df2e6feaebae8SHA-256: 405d75955451adb70e4f1a230eccf30970bdc39c3fa7135cec447c546a5a512e
 
(The unlinked packages above are only available from the Red Hat Network)
1148730 – Regression from bash function mangling patch breaks “at” jobs

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply