After updating the patches for shellshock vulnerability, at jobs are no longer working

Solution Verified - Updated -

Issue

  • After updating the patches for shellshock vulnerability, at jobs are no longer working in Red Hat Enterprise Linux 6
  • at is broken after applying the shellshock patches
[root@XXXX ~]# at now
at> ls
at> <EOT>
job 6 at 2014-09-26 12:05

Actual results:

[root@XXXX ~]# at now
at> ls
at> <EOT>
job 6 at 2014-09-26 12:05

...

From root@XXXx  Fri Sep 26 12:05:38 2014
Return-Path: <root@XXXX>
X-Original-To: root
Delivered-To: root@XXXX
Subject: Output from your job        6
To: root@XXXXX
Date: Fri, 26 Sep 2014 12:05:37 -0400 (EDT)
From: root@XXXXX(root)
Status: R

sh: line 37: syntax error near unexpected token `=\(\)\ {\ \ eval\ \`/usr/bin/modulecmd\ bash\ \$\*\`"
"}'
sh: line 37: `"}; export BASH_FUNC_module()'

Environment

  • Red Hat Enterprise Linux (RHEL) 5
    • bash-3.2-33.el5_11.4
    • at-3.1.8-84.el5
    • environment-modules-3.2.10-1.el5
  • Red Hat Enterprise Linux (RHEL) 6
    • at-3.1.10-43.el6_2.1.x86_64
    • bash-4.1.2-15.el6_5.1.x86_64 or bash-4.1.2-15.el6_5.2
    • environment-modules-3.2.10-1.el6_5.x86_64
  • Red Hat Enterprise Linux (RHEL) 7
    • bash-4.2.45-5.el7_0.4.x86_64
    • at-3.1.13-17.el7.x86_64
    • environment-modules-3.2.10-8.el7.x86_64

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In