- Issued:
- 2006-09-14
- Updated:
- 2007-05-01
RHBA-2006:0649 - Bug Fix Advisory
Synopsis
aspell bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated aspell packages that fix a bug are now available.
Description
Aspell is a spelling checker that features compile-time and run-time
support for English as well as non-English languages and can spell check
(La)TeX and HTML files.
The previous version of Aspell did not contain manual pages; the new
version contains four new manual pages (aspell-import run-with-aspell
word-list-compress aspell).
All users of aspell are advised to upgrade to these updated packages, which
resolve this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 165623 - no manual or info pages exist
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
aspell-0.50.5-4.EL4.src.rpm | SHA-256: 3e7d9a8d62ecabdd539974e2ada1e7a1d73262abf2bb3be7b4b8cb997bc60b7f |
x86_64 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.x86_64.rpm | SHA-256: 2823036fd7574e5ff1b59d69a36b868e15f2090afc7813b47bd0a4b0685f8bbf |
aspell-0.50.5-4.EL4.x86_64.rpm | SHA-256: 2823036fd7574e5ff1b59d69a36b868e15f2090afc7813b47bd0a4b0685f8bbf |
aspell-devel-0.50.5-4.EL4.x86_64.rpm | SHA-256: 759bf4408048e55c9118458ba51acb958d29449bcffac103ba28e0a0314ed2e3 |
aspell-devel-0.50.5-4.EL4.x86_64.rpm | SHA-256: 759bf4408048e55c9118458ba51acb958d29449bcffac103ba28e0a0314ed2e3 |
ia64 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.ia64.rpm | SHA-256: a2c2aff76434d9d16657927e5ec3d166392a6c4433a0b566fc8f76f6cf0f3685 |
aspell-0.50.5-4.EL4.ia64.rpm | SHA-256: a2c2aff76434d9d16657927e5ec3d166392a6c4433a0b566fc8f76f6cf0f3685 |
aspell-devel-0.50.5-4.EL4.ia64.rpm | SHA-256: 194d73b14b03b024007601c580504e501a8ffbb29780927b5debff172a5a5432 |
aspell-devel-0.50.5-4.EL4.ia64.rpm | SHA-256: 194d73b14b03b024007601c580504e501a8ffbb29780927b5debff172a5a5432 |
i386 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-devel-0.50.5-4.EL4.i386.rpm | SHA-256: cdd79155e48627bcc47cf7e5b20b565f9e101c73d9693dff51f82a246efe9e0c |
aspell-devel-0.50.5-4.EL4.i386.rpm | SHA-256: cdd79155e48627bcc47cf7e5b20b565f9e101c73d9693dff51f82a246efe9e0c |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
aspell-0.50.5-4.EL4.src.rpm | SHA-256: 3e7d9a8d62ecabdd539974e2ada1e7a1d73262abf2bb3be7b4b8cb997bc60b7f |
x86_64 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.x86_64.rpm | SHA-256: 2823036fd7574e5ff1b59d69a36b868e15f2090afc7813b47bd0a4b0685f8bbf |
aspell-devel-0.50.5-4.EL4.x86_64.rpm | SHA-256: 759bf4408048e55c9118458ba51acb958d29449bcffac103ba28e0a0314ed2e3 |
ia64 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.ia64.rpm | SHA-256: a2c2aff76434d9d16657927e5ec3d166392a6c4433a0b566fc8f76f6cf0f3685 |
aspell-devel-0.50.5-4.EL4.ia64.rpm | SHA-256: 194d73b14b03b024007601c580504e501a8ffbb29780927b5debff172a5a5432 |
i386 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-devel-0.50.5-4.EL4.i386.rpm | SHA-256: cdd79155e48627bcc47cf7e5b20b565f9e101c73d9693dff51f82a246efe9e0c |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
aspell-0.50.5-4.EL4.src.rpm | SHA-256: 3e7d9a8d62ecabdd539974e2ada1e7a1d73262abf2bb3be7b4b8cb997bc60b7f |
x86_64 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-0.50.5-4.EL4.x86_64.rpm | SHA-256: 2823036fd7574e5ff1b59d69a36b868e15f2090afc7813b47bd0a4b0685f8bbf |
aspell-devel-0.50.5-4.EL4.x86_64.rpm | SHA-256: 759bf4408048e55c9118458ba51acb958d29449bcffac103ba28e0a0314ed2e3 |
i386 | |
aspell-0.50.5-4.EL4.i386.rpm | SHA-256: b743bfbef6d0ed15e80422d14ed0795b4b7374c0cb0574f8fb4800d726037af2 |
aspell-devel-0.50.5-4.EL4.i386.rpm | SHA-256: cdd79155e48627bcc47cf7e5b20b565f9e101c73d9693dff51f82a246efe9e0c |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
aspell-0.50.5-4.EL4.src.rpm | SHA-256: 3e7d9a8d62ecabdd539974e2ada1e7a1d73262abf2bb3be7b4b8cb997bc60b7f |
s390x | |
aspell-0.50.5-4.EL4.s390.rpm | SHA-256: 78a7c4099083c7b61fcbd48a05b260c6c2a3cf7d37bb4f2e61136c6d6ab9ef71 |
aspell-0.50.5-4.EL4.s390x.rpm | SHA-256: a21cb270bbe2317ce3b1b12cb7e5c469ebf3130942ec336be7263a6f0eda37d2 |
aspell-devel-0.50.5-4.EL4.s390x.rpm | SHA-256: 5be968218c6e398422ccd7b8de0aa2bee08f722046c9698b4e77e92381d61f8d |
s390 | |
aspell-0.50.5-4.EL4.s390.rpm | SHA-256: 78a7c4099083c7b61fcbd48a05b260c6c2a3cf7d37bb4f2e61136c6d6ab9ef71 |
aspell-devel-0.50.5-4.EL4.s390.rpm | SHA-256: 7fa45bc33e10cf149e28993ff59cf31e1a9d17fd44e94baae13375a2dc046f74 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
aspell-0.50.5-4.EL4.src.rpm | SHA-256: 3e7d9a8d62ecabdd539974e2ada1e7a1d73262abf2bb3be7b4b8cb997bc60b7f |
ppc | |
aspell-0.50.5-4.EL4.ppc.rpm | SHA-256: 159c06b308653ca28741d49204f573f0480eccd48f07ad4390237fccf6d713a2 |
aspell-0.50.5-4.EL4.ppc64.rpm | SHA-256: f4d0a447d2dbb668a12c5430b1997b37a8b4514cdcae3736e77e7d8c8801ce1a |
aspell-devel-0.50.5-4.EL4.ppc.rpm | SHA-256: a6c8ab3e579590f0556bc37f291ed135dccf6e43e42c146b8d60ec578c5fa91e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.