Skip to navigation

Bug Fix Advisory at bug fix update

Advisory: RHBA-2012:0068-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-01-30
Last updated on: 2012-01-30
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated at package that fixes one bug is now available for Red Hat Enterprise
Linux 6.

The "at" package provides the at and "batch" commands, which are used to read
commands from standard input or from a specified file. The "at" command allows
you to specify that a command will be run at a particular time. The "batch"
command will execute commands when the system load levels drop to a particular
level. Both commands use the /bin/sh.

This update fixes the following bug:

* Due to an error in the time-parsing routine, the "at" command incorrectly
calculated the year when a job was scheduled by using days on input. For
example: "at now + 10 days". This update fixes erroneous grammar so that "at"
now schedules jobs correctly. (BZ#783190)

All users of at are advised to upgrade to this updated package, which fixes this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
IA-32:
at-3.1.10-43.el6_2.1.i686.rpm     MD5: fea688afdb6fa187ab31184b0172923a
SHA-256: af3aa9b8db3b3c964fe8a3288fd4ef478c69ed0dda6b73fcb9b778a80f9f7250
at-debuginfo-3.1.10-43.el6_2.1.i686.rpm     MD5: 1abb66cdf786df482f68b2edba8d5d91
SHA-256: 866b9e97871f63a09ee85695352d4c6229130cd0cb8489c146d859344d2000fe
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
IA-32:
at-3.1.10-43.el6_2.1.i686.rpm     MD5: fea688afdb6fa187ab31184b0172923a
SHA-256: af3aa9b8db3b3c964fe8a3288fd4ef478c69ed0dda6b73fcb9b778a80f9f7250
at-debuginfo-3.1.10-43.el6_2.1.i686.rpm     MD5: 1abb66cdf786df482f68b2edba8d5d91
SHA-256: 866b9e97871f63a09ee85695352d4c6229130cd0cb8489c146d859344d2000fe
 
PPC:
at-3.1.10-43.el6_2.1.ppc64.rpm     MD5: 8b89936c0ed67828ce438ba487eae588
SHA-256: e4faef813c7b9f3b72459904cb66eb89c780725fb28316501a8b9b87cb7cba9b
at-debuginfo-3.1.10-43.el6_2.1.ppc64.rpm     MD5: dc05cf6d30efe4b851ef1a8230216205
SHA-256: a66f242a01e176a0d35eab617e2887834604442379ca30b61ec0fa0786de3e7a
 
s390x:
at-3.1.10-43.el6_2.1.s390x.rpm     MD5: fec7d6a774739257a08ae1e5e6100135
SHA-256: ed5c26a9171c48b197e1170d0eac64c1ba561fa446d50865273322729309718d
at-debuginfo-3.1.10-43.el6_2.1.s390x.rpm     MD5: 8154ecb1f99dd35dc86c4cca6fea5a53
SHA-256: be007965a67f852768004d4e270be3bc572c24653e6a6e150487b8c3bd4ee9e6
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
IA-32:
at-3.1.10-43.el6_2.1.i686.rpm     MD5: fea688afdb6fa187ab31184b0172923a
SHA-256: af3aa9b8db3b3c964fe8a3288fd4ef478c69ed0dda6b73fcb9b778a80f9f7250
at-debuginfo-3.1.10-43.el6_2.1.i686.rpm     MD5: 1abb66cdf786df482f68b2edba8d5d91
SHA-256: 866b9e97871f63a09ee85695352d4c6229130cd0cb8489c146d859344d2000fe
 
PPC:
at-3.1.10-43.el6_2.1.ppc64.rpm     MD5: 8b89936c0ed67828ce438ba487eae588
SHA-256: e4faef813c7b9f3b72459904cb66eb89c780725fb28316501a8b9b87cb7cba9b
at-debuginfo-3.1.10-43.el6_2.1.ppc64.rpm     MD5: dc05cf6d30efe4b851ef1a8230216205
SHA-256: a66f242a01e176a0d35eab617e2887834604442379ca30b61ec0fa0786de3e7a
 
s390x:
at-3.1.10-43.el6_2.1.s390x.rpm     MD5: fec7d6a774739257a08ae1e5e6100135
SHA-256: ed5c26a9171c48b197e1170d0eac64c1ba561fa446d50865273322729309718d
at-debuginfo-3.1.10-43.el6_2.1.s390x.rpm     MD5: 8154ecb1f99dd35dc86c4cca6fea5a53
SHA-256: be007965a67f852768004d4e270be3bc572c24653e6a6e150487b8c3bd4ee9e6
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
at-3.1.10-43.el6_2.1.src.rpm     MD5: d75498221bbe44a0b0403d3390e439b8
SHA-256: df21a4e24af22e5fabcf667e52dfe2ece1c69633641ed87c813d4b05ef01dc1f
 
IA-32:
at-3.1.10-43.el6_2.1.i686.rpm     MD5: fea688afdb6fa187ab31184b0172923a
SHA-256: af3aa9b8db3b3c964fe8a3288fd4ef478c69ed0dda6b73fcb9b778a80f9f7250
at-debuginfo-3.1.10-43.el6_2.1.i686.rpm     MD5: 1abb66cdf786df482f68b2edba8d5d91
SHA-256: 866b9e97871f63a09ee85695352d4c6229130cd0cb8489c146d859344d2000fe
 
x86_64:
at-3.1.10-43.el6_2.1.x86_64.rpm     MD5: e36ca21845171c6f89da35559995d72a
SHA-256: 48d6ad0b4d60ef4cd7f56e6af1acdef95473cb3079362b9de57f74a8c08265ab
at-debuginfo-3.1.10-43.el6_2.1.x86_64.rpm     MD5: 0a5a290bbf26fa82216572595194830d
SHA-256: 9525b5c6bd66a54a2413dca94a16f677ad722113376693db24e2e860405d87c7
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

at, incorrect, year


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/