- Issued:
- 2014-10-15
- Updated:
- 2014-10-15
RHBA-2014:1638 - Bug Fix Advisory
Synopsis
at bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated at packages that fix one bug are now available for Red Hat Enterprise
Linux 6.
Description
The "at" packages provide the "at" and "batch" commands, which are
used to read commands from standard input or from a specified file.
The "at" command allows you to specify that a command will be run at
a particular time. The "batch" command executes commands when the
system load levels drop to a particular level. Both commands use
/bin/sh.
These updated packages fix the following bug:
- Due to a security issue fix in Bash, "at" jobs failed to run
because the "atd" daemon exported environment variables with an
incorrect syntax to the Bash shell running the jobs. With this update,
"atd" filters out environment variables that cannot be parsed by the
Bash shell, thus allowing the "at" jobs to run properly. (BZ#1152434)
Users are advised to upgrade to these updated at packages, which
resolve this issue.
Solution
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how
to use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
- Red Hat Gluster Storage Server for On-premise 2.1 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
- Red Hat Enterprise Linux EUS Compute Node 6.4 x86_64
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
- BZ - 1152434 - Regression from bash function mangling patch breaks "at" jobs
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
i386 | |
at-3.1.10-44.el6_4.1.i686.rpm | SHA-256: 05ce8b3f8cecb82dcc21c6d2bc48c978b3c5ff5a9982f75866744a6de6a8cb32 |
at-debuginfo-3.1.10-44.el6_4.1.i686.rpm | SHA-256: f56e636844dc6ebf6558956150fbb23cf81d61853f14ad2442e3fc7c47017e5d |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
ppc64 | |
at-3.1.10-44.el6_4.1.ppc64.rpm | SHA-256: 1ee0492ebf4cec47a77e7281c6242c8494c7d34f473b585cf54c3ec8e7b5b1e7 |
at-debuginfo-3.1.10-44.el6_4.1.ppc64.rpm | SHA-256: 6b46268ecbc18100d26549fa4315f04bbb72cf95e2bf11a27978f911b04508f5 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
i386 | |
at-3.1.10-44.el6_4.1.i686.rpm | SHA-256: 05ce8b3f8cecb82dcc21c6d2bc48c978b3c5ff5a9982f75866744a6de6a8cb32 |
at-debuginfo-3.1.10-44.el6_4.1.i686.rpm | SHA-256: f56e636844dc6ebf6558956150fbb23cf81d61853f14ad2442e3fc7c47017e5d |
Red Hat Gluster Storage Server for On-premise 2.1
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
Red Hat Storage for Public Cloud (via RHUI) 2.1
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
Red Hat Enterprise Linux EUS Compute Node 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
x86_64 | |
at-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 6d75fea1e7afd997d3e705f11f6dd1106c54916051b41be49ffdabda44059fc6 |
at-debuginfo-3.1.10-44.el6_4.1.x86_64.rpm | SHA-256: 4cbdd8756d193b19030b20f5c99ab4abcd07bb686867e922e4b152e779f5fc67 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4
SRPM | |
---|---|
at-3.1.10-44.el6_4.1.src.rpm | SHA-256: 795214c43a0e570bbe17220b06992f7247f626f66c1ccbc398347ada883b43d4 |
s390x | |
at-3.1.10-44.el6_4.1.s390x.rpm | SHA-256: 7ff867d8f841d08c41a160315a88d70a4440936303530142c83514eb03c20d40 |
at-debuginfo-3.1.10-44.el6_4.1.s390x.rpm | SHA-256: f005cf77c8b6fc123f86bf97ca1229eb3e4baeb24ea47c83061308b6343ba99b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.