Skip to navigation

Bug Fix Advisory groff bug fix update

Advisory: RHBA-2011:1484-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated groff packages that fix this bug is now available for Red Hat Enterprise
Linux 5.

Groff is a document formatting system. Groff takes standard text and formatting
commands as input and produces formatted output.

These updated groff packages fix the following bug:

* Prior to this update groff did not have full path commands in some places and
used PATH variables when invoking external binaries. When opening a man page in
a restricted shell environment the man page would not be displayed or an
erroneous error message, "old character encoding and/or character set",
appeared. With this update, groff now uses fully defined paths when invoking
external binaries. As a result the man pages can now be displayed in a
restricted shell environment. (BZ#448158)

All users of groff are advised to upgrade to these updated packages, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
groff-1.18.1.1-13.el5.src.rpm     MD5: 604dadad1552f5b5e9ddd6d7d25e057b
SHA-256: 5a34bcf9b7fa1a537ad842695eceb9f4b3c2df945af0c2c074322e2a7e593b21
 
IA-32:
groff-1.18.1.1-13.el5.i386.rpm     MD5: d4576f046efef0f39eb464a3dffae0da
SHA-256: b688041a93130eb9f28f60d60c64a14cfeb83cf7ef017d27226c6d44a01a426e
groff-gxditview-1.18.1.1-13.el5.i386.rpm     MD5: c4a8b239a9aa446cd0f888cd1dbee8cb
SHA-256: 72d1ed643ce88137b9f1f2ee941918837c43c081d387cdd4ab97df22c457b321
groff-perl-1.18.1.1-13.el5.i386.rpm     MD5: 09d11c392be931d45c4cc806e2596f80
SHA-256: 344e349c3f1d5e12079ea5714978450f9c5bd68c92bb5833b6587032b2d0eb3b
 
IA-64:
groff-1.18.1.1-13.el5.ia64.rpm     MD5: 013364fb4e05d3e36a2e583f10b6c9da
SHA-256: d8f859779c5de1e0a1e47f99a455a06fc5245e5aece0e3ad9830ae82234c5261
groff-gxditview-1.18.1.1-13.el5.ia64.rpm     MD5: 49f67799c7c9b148a774ac56c56f07d1
SHA-256: 893f439904d068815cb14c14482efe5069e522858592ca760f735a96a2dc5c00
groff-perl-1.18.1.1-13.el5.ia64.rpm     MD5: 4dc9644d04bbb32a03505eb7aaa15ebc
SHA-256: 4e452d3c6674a8fafc33be352f9fd18929eea052693081dcd71c8688dee46179
 
PPC:
groff-1.18.1.1-13.el5.ppc.rpm     MD5: 52aeceaae6f3e6ac3b5c1889b0dc9072
SHA-256: 868a14672532eef8c7e3511f8d88a11116e858cdc131cf9cd750836f5d6c312d
groff-gxditview-1.18.1.1-13.el5.ppc.rpm     MD5: a86e7311ad7ea3b09b2374747deb3f06
SHA-256: b5e8d334f12bc499c58f922cab1a94845ebf1a0fdc5b4baeeab719231f815bc5
groff-perl-1.18.1.1-13.el5.ppc.rpm     MD5: c6ffed58684aaa5ebf06f2d6611b3619
SHA-256: 545f3dd309c4e169500aec4fdaa346859b80a0b7257acb37875ecdce371018cf
 
s390x:
groff-1.18.1.1-13.el5.s390x.rpm     MD5: 4613d6014b4f2554eab11cb87b166db7
SHA-256: dc0617a55031998732b953be890844e878a6246b77cdda758d332b779f9efee9
groff-gxditview-1.18.1.1-13.el5.s390x.rpm     MD5: 3d35f7a773648897ed16d54495442871
SHA-256: ea705d9a4b1efa4eb2357557fa96e1b275cb75d13e4deb6c1c5055611703ee4f
groff-perl-1.18.1.1-13.el5.s390x.rpm     MD5: b56d120256b207da8095a9148f229448
SHA-256: fff08bf49c929d96ed0d09bfa14dd32fa5b4cf77b5832e19da1663de84629193
 
x86_64:
groff-1.18.1.1-13.el5.x86_64.rpm     MD5: 38f37f892f1e51bfee6a60aaa1a682d3
SHA-256: b1a51ef92e3d77084e76b7379707dd56b9e770cb1681964b6a3222083ee34d06
groff-gxditview-1.18.1.1-13.el5.x86_64.rpm     MD5: e83b729354b5a389bc2b636f34f33723
SHA-256: bd976aeddfa00f0fa0dacb8a5d437e7f6d4739362dfebee90d85af9133906323
groff-perl-1.18.1.1-13.el5.x86_64.rpm     MD5: dabc8d600a0de2b1c6e9789e6ae6a61b
SHA-256: 190da461884e2c9ff1338b8cd0ca01fa637d252436bcb05725eaa7a408ac9736
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
groff-1.18.1.1-13.el5.src.rpm     MD5: 604dadad1552f5b5e9ddd6d7d25e057b
SHA-256: 5a34bcf9b7fa1a537ad842695eceb9f4b3c2df945af0c2c074322e2a7e593b21
 
IA-32:
groff-1.18.1.1-13.el5.i386.rpm     MD5: d4576f046efef0f39eb464a3dffae0da
SHA-256: b688041a93130eb9f28f60d60c64a14cfeb83cf7ef017d27226c6d44a01a426e
groff-gxditview-1.18.1.1-13.el5.i386.rpm     MD5: c4a8b239a9aa446cd0f888cd1dbee8cb
SHA-256: 72d1ed643ce88137b9f1f2ee941918837c43c081d387cdd4ab97df22c457b321
groff-perl-1.18.1.1-13.el5.i386.rpm     MD5: 09d11c392be931d45c4cc806e2596f80
SHA-256: 344e349c3f1d5e12079ea5714978450f9c5bd68c92bb5833b6587032b2d0eb3b
 
x86_64:
groff-1.18.1.1-13.el5.x86_64.rpm     MD5: 38f37f892f1e51bfee6a60aaa1a682d3
SHA-256: b1a51ef92e3d77084e76b7379707dd56b9e770cb1681964b6a3222083ee34d06
groff-gxditview-1.18.1.1-13.el5.x86_64.rpm     MD5: e83b729354b5a389bc2b636f34f33723
SHA-256: bd976aeddfa00f0fa0dacb8a5d437e7f6d4739362dfebee90d85af9133906323
groff-perl-1.18.1.1-13.el5.x86_64.rpm     MD5: dabc8d600a0de2b1c6e9789e6ae6a61b
SHA-256: 190da461884e2c9ff1338b8cd0ca01fa637d252436bcb05725eaa7a408ac9736
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

448158 - Nroff script attempts to use PATH commands as opposed to fully-defined ones.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/