- Issued:
- 2009-05-27
- Updated:
- 2009-09-02
RHBA-2009:1070 - Bug Fix Advisory
Synopsis
aspell bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated aspell-nl package that fixes a bug is now available.
Description
Aspel-nl provides the word list/dictionaries for Dutch language.
This updated aspell-nl package fixes the following bug:
- the previous aspell-nl update provided also an empty aspell-nl-debuginfo
package. The dictionary packages for Aspell do not require debuginfo
packages; this update therefore removes the extraneous aspell-nl-debuginfo
package. (BZ#500540)
All Dutch language Aspell users are advised to upgrade to this updated
package, which resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 500540 - aspell-nl generates debuginfo package while it should not
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
x86_64 | |
aspell-nl-0.1e-2.el5.x86_64.rpm | SHA-256: c370754e4d52d03c813732be07bba78e9fe5971186c72211b1abd747bcd087e7 |
ia64 | |
aspell-nl-0.1e-2.el5.ia64.rpm | SHA-256: 7ef4e09e107ead834529e9a94dc64567373276fc18d7fcabfbcce7dc07867a4a |
i386 | |
aspell-nl-0.1e-2.el5.i386.rpm | SHA-256: 61837ad1888c5a1eb4de93eaa71076d1a7e5d4e86b6e1e0686b6637e6e02ece9 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
x86_64 | |
aspell-nl-0.1e-2.el5.x86_64.rpm | SHA-256: c370754e4d52d03c813732be07bba78e9fe5971186c72211b1abd747bcd087e7 |
i386 | |
aspell-nl-0.1e-2.el5.i386.rpm | SHA-256: 61837ad1888c5a1eb4de93eaa71076d1a7e5d4e86b6e1e0686b6637e6e02ece9 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
x86_64 | |
aspell-nl-0.1e-2.el5.x86_64.rpm | SHA-256: c370754e4d52d03c813732be07bba78e9fe5971186c72211b1abd747bcd087e7 |
i386 | |
aspell-nl-0.1e-2.el5.i386.rpm | SHA-256: 61837ad1888c5a1eb4de93eaa71076d1a7e5d4e86b6e1e0686b6637e6e02ece9 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
s390x | |
aspell-nl-0.1e-2.el5.s390x.rpm | SHA-256: 3f9aeb20ac9365e670824ccccd045dea9a4f9bed4b14f79c73fcab4dc2ac13fb |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
ppc | |
aspell-nl-0.1e-2.el5.ppc.rpm | SHA-256: 3bda3bdd929c1457b218be84f5da967b1fcccaa5489202641ed426470bd179cf |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
aspell-nl-0.1e-2.el5.src.rpm | SHA-256: c0641a1aa0168dca1719753097a2064d131dfdcdc4c884020b46472d85ee94d5 |
x86_64 | |
aspell-nl-0.1e-2.el5.x86_64.rpm | SHA-256: c370754e4d52d03c813732be07bba78e9fe5971186c72211b1abd747bcd087e7 |
i386 | |
aspell-nl-0.1e-2.el5.i386.rpm | SHA-256: 61837ad1888c5a1eb4de93eaa71076d1a7e5d4e86b6e1e0686b6637e6e02ece9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.