LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Important: tetex security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated tetex packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. Alin Rad Pop discovered several flaws in the handling of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. This update has been rated as having important security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: tetex security update
Advisory ID:       RHSA-2007:1027-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-1027.html
Issue date:        2007-11-08
Updated on:        2007-11-08
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-4033 CVE-2007-4352 CVE-2007-5392 
                   CVE-2007-5393 
- ---------------------------------------------------------------------

1. Summary:

Updated tetex packages that fix several security issues are now available
for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

TeTeX is an implementation of TeX. TeX takes a text file and a set of
formatting commands as input, and creates a typesetter-independent DeVice
Independent (dvi) file as output. 

Alin Rad Pop discovered several flaws in the handling of PDF files. An
attacker could create a malicious PDF file that would cause TeTeX to crash
or potentially execute arbitrary code when opened. 
(CVE-2007-4352, CVE-2007-5392, CVE-2007-5393)

A flaw was found in the t1lib library, used in the handling of Type 1
fonts. An attacker could create a malicious file that would cause TeTeX to
crash, or potentially execute arbitrary code when opened. (CVE-2007-4033)

Users are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

345101 - CVE-2007-4352 xpdf memory corruption in DCTStream::readProgressiveDataUnit()
345111 - CVE-2007-5392 xpdf buffer overflow in DCTStream::reset()
345121 - CVE-2007-5393 xpdf buffer overflow in CCITTFaxStream::lookChar()
352271 - CVE-2007-4033 t1lib font filename string overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116  tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564  tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd  tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51  tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0  tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025  tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac  tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d  tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34  tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112  tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272  tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c  tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd  tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704  tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695  tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc  tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905  tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

ppc:
1362563a88035d1b5e568c3342e4ac27  tetex-2.0.2-22.0.1.EL4.10.ppc.rpm
83244a2db4c8bd99d4cb38cdf4844551  tetex-afm-2.0.2-22.0.1.EL4.10.ppc.rpm
f7ff046449533d6e7c3707e238c3de77  tetex-debuginfo-2.0.2-22.0.1.EL4.10.ppc.rpm
4707560e62f573407de9c3f611e06004  tetex-doc-2.0.2-22.0.1.EL4.10.ppc.rpm
1a4a981d8f4d1627207eec38d5b7b23b  tetex-dvips-2.0.2-22.0.1.EL4.10.ppc.rpm
d8fd2d03c0c02c8f2e7f31560d8ea937  tetex-fonts-2.0.2-22.0.1.EL4.10.ppc.rpm
5820a8afd235502f0a398a689dd6a62d  tetex-latex-2.0.2-22.0.1.EL4.10.ppc.rpm
4f3648c6fc71c75e6b86836a98c4866a  tetex-xdvi-2.0.2-22.0.1.EL4.10.ppc.rpm

s390:
a3b525ffbd450b2167e68831c2b55b73  tetex-2.0.2-22.0.1.EL4.10.s390.rpm
4b0d73456a23c998c4ec04fb22c23ddb  tetex-afm-2.0.2-22.0.1.EL4.10.s390.rpm
8af45d912827f0cf5963f269d18a52e0  tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390.rpm
f29a2b2a4c21c9cf104be216c6a5b0fe  tetex-doc-2.0.2-22.0.1.EL4.10.s390.rpm
d41e8fd19df69be9e1f34fb1dada735f  tetex-dvips-2.0.2-22.0.1.EL4.10.s390.rpm
ff2526d5aa53852065ffee38b490cd67  tetex-fonts-2.0.2-22.0.1.EL4.10.s390.rpm
baa804414ce7c1a7cdc443dd8e0a0dcd  tetex-latex-2.0.2-22.0.1.EL4.10.s390.rpm
0b7943a6d9800d90d4dbacac0302d531  tetex-xdvi-2.0.2-22.0.1.EL4.10.s390.rpm

s390x:
43976716352f385d87865db38ea615af  tetex-2.0.2-22.0.1.EL4.10.s390x.rpm
c644606a45f5a83ef9818973990325ea  tetex-afm-2.0.2-22.0.1.EL4.10.s390x.rpm
e6316aeb56d2e6153f77bcc5fba3791d  tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390x.rpm
abacd59736f4169de95bfcf2382afa55  tetex-doc-2.0.2-22.0.1.EL4.10.s390x.rpm
f99dbe4de2733668786ee110f4896ed7  tetex-dvips-2.0.2-22.0.1.EL4.10.s390x.rpm
b39ab1c0dc6a27c50f1611475402c26a  tetex-fonts-2.0.2-22.0.1.EL4.10.s390x.rpm
4ce12256a2a348f11cbfa9e368e2c734  tetex-latex-2.0.2-22.0.1.EL4.10.s390x.rpm
92b7f3c840d5523de4f979f015a3d062  tetex-xdvi-2.0.2-22.0.1.EL4.10.s390x.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4  tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5  tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96  tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd  tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c  tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176  tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4  tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051  tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116  tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564  tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd  tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51  tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0  tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025  tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac  tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d  tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34  tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4  tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5  tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96  tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd  tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c  tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176  tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4  tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051  tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116  tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564  tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd  tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51  tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0  tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025  tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac  tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d  tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34  tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112  tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272  tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c  tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd  tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704  tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695  tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc  tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905  tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4  tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5  tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96  tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd  tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c  tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176  tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4  tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051  tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116  tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564  tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd  tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51  tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0  tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025  tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac  tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d  tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34  tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112  tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272  tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c  tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd  tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704  tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695  tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc  tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905  tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4  tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5  tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96  tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd  tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c  tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176  tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4  tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051  tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm
b1b42ba1708170366ef929542721e792  tetex-3.0-33.2.el5_1.2.src.rpm

i386:
1fbc3969e96b466560c90814b25aebe5  tetex-3.0-33.2.el5_1.2.i386.rpm
440c373bdd22150fa5ad4804f078fec6  tetex-afm-3.0-33.2.el5_1.2.i386.rpm
1eb33138cf83a75a380ad06bf50ac645  tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm
b5086ee4832639db57282878a9b4aa4c  tetex-doc-3.0-33.2.el5_1.2.i386.rpm
0568b6191a2f33f0b5ea028e419c0194  tetex-dvips-3.0-33.2.el5_1.2.i386.rpm
31fcdbc3370b30c2c665e86b5ca130a5  tetex-fonts-3.0-33.2.el5_1.2.i386.rpm
b2aae2adc2955a745774c227e4e335df  tetex-latex-3.0-33.2.el5_1.2.i386.rpm
6c708669d258dc905000c1d20d18ad91  tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm

x86_64:
7a6307a6176d11dd21ec38a79260d5a1  tetex-3.0-33.2.el5_1.2.x86_64.rpm
3dbdc412d3a9a189af7b62988e984db9  tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm
2e422824056f6c01c354e8c32de5da7e  tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm
3b43cf065dbdb05fb6c6114ff73960d2  tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm
ed0a4845c96a539aead363cd53eeee14  tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm
b14ed77067e9d92450b98d2bb5e31008  tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm
291b02f4ab3ce4f51f87bd525b09adef  tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm
a21bff151a307f6c1124f15fc609f0d4  tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm
b1b42ba1708170366ef929542721e792  tetex-3.0-33.2.el5_1.2.src.rpm

i386:
1fbc3969e96b466560c90814b25aebe5  tetex-3.0-33.2.el5_1.2.i386.rpm
440c373bdd22150fa5ad4804f078fec6  tetex-afm-3.0-33.2.el5_1.2.i386.rpm
1eb33138cf83a75a380ad06bf50ac645  tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm
b5086ee4832639db57282878a9b4aa4c  tetex-doc-3.0-33.2.el5_1.2.i386.rpm
0568b6191a2f33f0b5ea028e419c0194  tetex-dvips-3.0-33.2.el5_1.2.i386.rpm
31fcdbc3370b30c2c665e86b5ca130a5  tetex-fonts-3.0-33.2.el5_1.2.i386.rpm
b2aae2adc2955a745774c227e4e335df  tetex-latex-3.0-33.2.el5_1.2.i386.rpm
6c708669d258dc905000c1d20d18ad91  tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm

ia64:
f14401b2d2014defb1b54995368948f2  tetex-3.0-33.2.el5_1.2.ia64.rpm
965666eb86b632b64019a082dacd40ba  tetex-afm-3.0-33.2.el5_1.2.ia64.rpm
3a2a99f272ac94c40054053d54e54037  tetex-debuginfo-3.0-33.2.el5_1.2.ia64.rpm
8273756d1787fb0fa59c61520e0b13ef  tetex-doc-3.0-33.2.el5_1.2.ia64.rpm
a98808f0b6242a235086ea8995623dfd  tetex-dvips-3.0-33.2.el5_1.2.ia64.rpm
4582e88c285f14755def63dbd7b95d70  tetex-fonts-3.0-33.2.el5_1.2.ia64.rpm
330c602f426255fca1ce4e9bdda1e9d9  tetex-latex-3.0-33.2.el5_1.2.ia64.rpm
f781a1659fb4f1edfa733fe478bff0c7  tetex-xdvi-3.0-33.2.el5_1.2.ia64.rpm

ppc:
433c7e0dacb9204070eb4e1b91db5a6d  tetex-3.0-33.2.el5_1.2.ppc.rpm
51b25740e8c0a82337015af7c8a7a6b4  tetex-afm-3.0-33.2.el5_1.2.ppc.rpm
991d10cdd08bae2e414647faebb91f1b  tetex-debuginfo-3.0-33.2.el5_1.2.ppc.rpm
85a01809c690a6684b4d39f589cf78ba  tetex-doc-3.0-33.2.el5_1.2.ppc.rpm
d36f0865f96879fd8e154d4bb890c092  tetex-dvips-3.0-33.2.el5_1.2.ppc.rpm
b2c62aaaa82424cd7c46d39d8d3a7ef2  tetex-fonts-3.0-33.2.el5_1.2.ppc.rpm
6e0e98dd3e06ffe93c0c003466c53ffd  tetex-latex-3.0-33.2.el5_1.2.ppc.rpm
a7baac84232ddeddd26bc43719676605  tetex-xdvi-3.0-33.2.el5_1.2.ppc.rpm

s390x:
a06beda8f1884944fd8714337b02e5f8  tetex-3.0-33.2.el5_1.2.s390x.rpm
d19f6c8e75e73a1aa3f9a5a7227189e6  tetex-afm-3.0-33.2.el5_1.2.s390x.rpm
937e7a798bb900f93d0e499706313102  tetex-debuginfo-3.0-33.2.el5_1.2.s390x.rpm
314aaf805fa9908c5bd8dd066a78ee69  tetex-doc-3.0-33.2.el5_1.2.s390x.rpm
ffeeb98bc3d453d766f6834f681018e2  tetex-dvips-3.0-33.2.el5_1.2.s390x.rpm
bc495169336a4193e62573c91ca98e08  tetex-fonts-3.0-33.2.el5_1.2.s390x.rpm
27817f1ec00502caa8ab74c0dea42e8b  tetex-latex-3.0-33.2.el5_1.2.s390x.rpm
051531181be471e4afbea3cc76e0087b  tetex-xdvi-3.0-33.2.el5_1.2.s390x.rpm

x86_64:
7a6307a6176d11dd21ec38a79260d5a1  tetex-3.0-33.2.el5_1.2.x86_64.rpm
3dbdc412d3a9a189af7b62988e984db9  tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm
2e422824056f6c01c354e8c32de5da7e  tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm
3b43cf065dbdb05fb6c6114ff73960d2  tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm
ed0a4845c96a539aead363cd53eeee14  tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm
b14ed77067e9d92450b98d2bb5e31008  tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm
291b02f4ab3ce4f51f87bd525b09adef  tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm
a21bff151a307f6c1124f15fc609f0d4  tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Heartbleed: Security experts reality-check the 3 most hysterical fears
Open source trounces proprietary software for code defects, Coverity analysis finds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.