Updated at packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

The “at” packages provide the “at” and “batch” commands, which are used to readcommands from standard input or from a specified file. The “at” command allowsyou to specify that a command will be run at a particular time. The “batch”command will execute commands when the system load levels drop to a particularlevel. Both commands use /bin/sh.This update fixes the following bug:* Due to a security issue fix in Bash, “at” jobs failed to run because the “atd”daemon exported environment variables with an incorrect syntax to the Bash shellrunning the jobs. With this update, “atd” filters out environment variables thatcannot be parsed by the Bash shell, thus allowing the “at” jobs to run properly.(BZ#1148731)Users of at are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
IA-32:
at-3.1.10-44.el6_6.2.i686.rpm
    MD5: b6bf8df0dcfc6b49e4cc9f1428d98238SHA-256: d334647e8c4fea2b5ac431868d2be1623cc35b0894f60540f36844af5b6ffbd5
at-debuginfo-3.1.10-44.el6_6.2.i686.rpm
    MD5: 65727c7bc4a1e0d21646f3714c340b69SHA-256: 6b6c1540db043d5bb6c47ce8f2458eb487aef4ac88bc5c682c53291552e2064f
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux High Availability EUS (v. 6.6.z)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux Load Balancer (v. 6)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux Resilient Storage EUS (v. 6.6.z)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
IA-32:
at-3.1.10-44.el6_6.2.i686.rpm
    MD5: b6bf8df0dcfc6b49e4cc9f1428d98238SHA-256: d334647e8c4fea2b5ac431868d2be1623cc35b0894f60540f36844af5b6ffbd5
at-debuginfo-3.1.10-44.el6_6.2.i686.rpm
    MD5: 65727c7bc4a1e0d21646f3714c340b69SHA-256: 6b6c1540db043d5bb6c47ce8f2458eb487aef4ac88bc5c682c53291552e2064f
 
PPC:
at-3.1.10-44.el6_6.2.ppc64.rpm
    MD5: dd3ced8f24f46bf7b03663bd00f9df08SHA-256: 2427e5eb8ef6f12fbcb8453e70ab8b201671584f3c7088caf754580b8584052f
at-debuginfo-3.1.10-44.el6_6.2.ppc64.rpm
    MD5: 3e89e2fd2e2fccc0870aac7983e3cedcSHA-256: 987a02f738b778de849da5f1da2884edefd4b90f30e4cf6f97636b8c7a6c988c
 
s390x:
at-3.1.10-44.el6_6.2.s390x.rpm
    MD5: bb6f270b07101833b198a5c9805cb622SHA-256: f54fdd4ae84683630e2ff8234081ce144aac54a6f27ea4766ec9387ad71f71a6
at-debuginfo-3.1.10-44.el6_6.2.s390x.rpm
    MD5: 838538e0d65a7dcc1d5850dd8b37d51eSHA-256: 07923f55693de393d4c2933bc7788584fbde9538db950782437440a3f5561261
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
IA-32:
at-3.1.10-44.el6_6.2.i686.rpm
    MD5: b6bf8df0dcfc6b49e4cc9f1428d98238SHA-256: d334647e8c4fea2b5ac431868d2be1623cc35b0894f60540f36844af5b6ffbd5
at-debuginfo-3.1.10-44.el6_6.2.i686.rpm
    MD5: 65727c7bc4a1e0d21646f3714c340b69SHA-256: 6b6c1540db043d5bb6c47ce8f2458eb487aef4ac88bc5c682c53291552e2064f
 
PPC:
at-3.1.10-44.el6_6.2.ppc64.rpm
    MD5: dd3ced8f24f46bf7b03663bd00f9df08SHA-256: 2427e5eb8ef6f12fbcb8453e70ab8b201671584f3c7088caf754580b8584052f
at-debuginfo-3.1.10-44.el6_6.2.ppc64.rpm
    MD5: 3e89e2fd2e2fccc0870aac7983e3cedcSHA-256: 987a02f738b778de849da5f1da2884edefd4b90f30e4cf6f97636b8c7a6c988c
 
s390x:
at-3.1.10-44.el6_6.2.s390x.rpm
    MD5: bb6f270b07101833b198a5c9805cb622SHA-256: f54fdd4ae84683630e2ff8234081ce144aac54a6f27ea4766ec9387ad71f71a6
at-debuginfo-3.1.10-44.el6_6.2.s390x.rpm
    MD5: 838538e0d65a7dcc1d5850dd8b37d51eSHA-256: 07923f55693de393d4c2933bc7788584fbde9538db950782437440a3f5561261
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
at-3.1.10-44.el6_6.2.src.rpm
    MD5: 9662371a449532dce22abdd482cdc6b1SHA-256: 81190de21a0c44a20083b1450afd638747566dfa4fd0486f809ac1f70bc70c27
 
IA-32:
at-3.1.10-44.el6_6.2.i686.rpm
    MD5: b6bf8df0dcfc6b49e4cc9f1428d98238SHA-256: d334647e8c4fea2b5ac431868d2be1623cc35b0894f60540f36844af5b6ffbd5
at-debuginfo-3.1.10-44.el6_6.2.i686.rpm
    MD5: 65727c7bc4a1e0d21646f3714c340b69SHA-256: 6b6c1540db043d5bb6c47ce8f2458eb487aef4ac88bc5c682c53291552e2064f
 
x86_64:
at-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: 937c135f2f4d928648b15562214d1d5aSHA-256: 1e822128646818b5b26941a6c683eab138dccc7cd2f70de92717fc0240797411
at-debuginfo-3.1.10-44.el6_6.2.x86_64.rpm
    MD5: db79bfd424f4d8169b4fa189be616a07SHA-256: 3fcd563dc17194ff1f0c7809822be0d13dae98333b5ca7d94c4d2ef2d4a8ff80
 
(The unlinked packages above are only available from the Red Hat Network)
1148731 – Regression from bash function mangling patch breaks “at” jobs

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply