Home / mailingsPDF  

[RHSA-2007:1027-02] Important: tetex security update

Posted on 08 November 2007
RedHat

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: tetex security update
Advisory ID: RHSA-2007:1027-02
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1027.html
Issue date: 2007-11-08
Updated on: 2007-11-08
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-4033 CVE-2007-4352 CVE-2007-5392
CVE-2007-5393
- ---------------------------------------------------------------------

1. Summary:

Updated tetex packages that fix several security issues are now available
for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

TeTeX is an implementation of TeX. TeX takes a text file and a set of
formatting commands as input, and creates a typesetter-independent DeVice
Independent (dvi) file as output.

Alin Rad Pop discovered several flaws in the handling of PDF files. An
attacker could create a malicious PDF file that would cause TeTeX to crash
or potentially execute arbitrary code when opened.
(CVE-2007-4352, CVE-2007-5392, CVE-2007-5393)

A flaw was found in the t1lib library, used in the handling of Type 1
fonts. An attacker could create a malicious file that would cause TeTeX to
crash, or potentially execute arbitrary code when opened. (CVE-2007-4033)

Users are advised to upgrade to these updated packages, which contain
backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

345101 - CVE-2007-4352 xpdf memory corruption in DCTStream::readProgressiveDataUnit()
345111 - CVE-2007-5392 xpdf buffer overflow in DCTStream::reset()
345121 - CVE-2007-5393 xpdf buffer overflow in CCITTFaxStream::lookChar()
352271 - CVE-2007-4033 t1lib font filename string overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

ppc:
1362563a88035d1b5e568c3342e4ac27 tetex-2.0.2-22.0.1.EL4.10.ppc.rpm
83244a2db4c8bd99d4cb38cdf4844551 tetex-afm-2.0.2-22.0.1.EL4.10.ppc.rpm
f7ff046449533d6e7c3707e238c3de77 tetex-debuginfo-2.0.2-22.0.1.EL4.10.ppc.rpm
4707560e62f573407de9c3f611e06004 tetex-doc-2.0.2-22.0.1.EL4.10.ppc.rpm
1a4a981d8f4d1627207eec38d5b7b23b tetex-dvips-2.0.2-22.0.1.EL4.10.ppc.rpm
d8fd2d03c0c02c8f2e7f31560d8ea937 tetex-fonts-2.0.2-22.0.1.EL4.10.ppc.rpm
5820a8afd235502f0a398a689dd6a62d tetex-latex-2.0.2-22.0.1.EL4.10.ppc.rpm
4f3648c6fc71c75e6b86836a98c4866a tetex-xdvi-2.0.2-22.0.1.EL4.10.ppc.rpm

s390:
a3b525ffbd450b2167e68831c2b55b73 tetex-2.0.2-22.0.1.EL4.10.s390.rpm
4b0d73456a23c998c4ec04fb22c23ddb tetex-afm-2.0.2-22.0.1.EL4.10.s390.rpm
8af45d912827f0cf5963f269d18a52e0 tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390.rpm
f29a2b2a4c21c9cf104be216c6a5b0fe tetex-doc-2.0.2-22.0.1.EL4.10.s390.rpm
d41e8fd19df69be9e1f34fb1dada735f tetex-dvips-2.0.2-22.0.1.EL4.10.s390.rpm
ff2526d5aa53852065ffee38b490cd67 tetex-fonts-2.0.2-22.0.1.EL4.10.s390.rpm
baa804414ce7c1a7cdc443dd8e0a0dcd tetex-latex-2.0.2-22.0.1.EL4.10.s390.rpm
0b7943a6d9800d90d4dbacac0302d531 tetex-xdvi-2.0.2-22.0.1.EL4.10.s390.rpm

s390x:
43976716352f385d87865db38ea615af tetex-2.0.2-22.0.1.EL4.10.s390x.rpm
c644606a45f5a83ef9818973990325ea tetex-afm-2.0.2-22.0.1.EL4.10.s390x.rpm
e6316aeb56d2e6153f77bcc5fba3791d tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390x.rpm
abacd59736f4169de95bfcf2382afa55 tetex-doc-2.0.2-22.0.1.EL4.10.s390x.rpm
f99dbe4de2733668786ee110f4896ed7 tetex-dvips-2.0.2-22.0.1.EL4.10.s390x.rpm
b39ab1c0dc6a27c50f1611475402c26a tetex-fonts-2.0.2-22.0.1.EL4.10.s390x.rpm
4ce12256a2a348f11cbfa9e368e2c734 tetex-latex-2.0.2-22.0.1.EL4.10.s390x.rpm
92b7f3c840d5523de4f979f015a3d062 tetex-xdvi-2.0.2-22.0.1.EL4.10.s390x.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm
ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm

i386:
027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm
2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm
66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm
f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm
e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm
340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm
c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm
efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm

ia64:
e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm
597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm
aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm
dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm
12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm
60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm
424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm
7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm

x86_64:
9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm
6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm
f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm
75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm
f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm
6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm
0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm
5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm
b1b42ba1708170366ef929542721e792 tetex-3.0-33.2.el5_1.2.src.rpm

i386:
1fbc3969e96b466560c90814b25aebe5 tetex-3.0-33.2.el5_1.2.i386.rpm
440c373bdd22150fa5ad4804f078fec6 tetex-afm-3.0-33.2.el5_1.2.i386.rpm
1eb33138cf83a75a380ad06bf50ac645 tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm
b5086ee4832639db57282878a9b4aa4c tetex-doc-3.0-33.2.el5_1.2.i386.rpm
0568b6191a2f33f0b5ea028e419c0194 tetex-dvips-3.0-33.2.el5_1.2.i386.rpm
31fcdbc3370b30c2c665e86b5ca130a5 tetex-fonts-3.0-33.2.el5_1.2.i386.rpm
b2aae2adc2955a745774c227e4e335df tetex-latex-3.0-33.2.el5_1.2.i386.rpm
6c708669d258dc905000c1d20d18ad91 tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm

x86_64:
7a6307a6176d11dd21ec38a79260d5a1 tetex-3.0-33.2.el5_1.2.x86_64.rpm
3dbdc412d3a9a189af7b62988e984db9 tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm
2e422824056f6c01c354e8c32de5da7e tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm
3b43cf065dbdb05fb6c6114ff73960d2 tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm
ed0a4845c96a539aead363cd53eeee14 tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm
b14ed77067e9d92450b98d2bb5e31008 tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm
291b02f4ab3ce4f51f87bd525b09adef tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm
a21bff151a307f6c1124f15fc609f0d4 tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm
b1b42ba1708170366ef929542721e792 tetex-3.0-33.2.el5_1.2.src.rpm

i386:
1fbc3969e96b466560c90814b25aebe5 tetex-3.0-33.2.el5_1.2.i386.rpm
440c373bdd22150fa5ad4804f078fec6 tetex-afm-3.0-33.2.el5_1.2.i386.rpm
1eb33138cf83a75a380ad06bf50ac645 tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm
b5086ee4832639db57282878a9b4aa4c tetex-doc-3.0-33.2.el5_1.2.i386.rpm
0568b6191a2f33f0b5ea028e419c0194 tetex-dvips-3.0-33.2.el5_1.2.i386.rpm
31fcdbc3370b30c2c665e86b5ca130a5 tetex-fonts-3.0-33.2.el5_1.2.i386.rpm
b2aae2adc2955a745774c227e4e335df tetex-latex-3.0-33.2.el5_1.2.i386.rpm
6c708669d258dc905000c1d20d18ad91 tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm

ia64:
f14401b2d2014defb1b54995368948f2 tetex-3.0-33.2.el5_1.2.ia64.rpm
965666eb86b632b64019a082dacd40ba tetex-afm-3.0-33.2.el5_1.2.ia64.rpm
3a2a99f272ac94c40054053d54e54037 tetex-debuginfo-3.0-33.2.el5_1.2.ia64.rpm
8273756d1787fb0fa59c61520e0b13ef tetex-doc-3.0-33.2.el5_1.2.ia64.rpm
a98808f0b6242a235086ea8995623dfd tetex-dvips-3.0-33.2.el5_1.2.ia64.rpm
4582e88c285f14755def63dbd7b95d70 tetex-fonts-3.0-33.2.el5_1.2.ia64.rpm
330c602f426255fca1ce4e9bdda1e9d9 tetex-latex-3.0-33.2.el5_1.2.ia64.rpm
f781a1659fb4f1edfa733fe478bff0c7 tetex-xdvi-3.0-33.2.el5_1.2.ia64.rpm

ppc:
433c7e0dacb9204070eb4e1b91db5a6d tetex-3.0-33.2.el5_1.2.ppc.rpm
51b25740e8c0a82337015af7c8a7a6b4 tetex-afm-3.0-33.2.el5_1.2.ppc.rpm
991d10cdd08bae2e414647faebb91f1b tetex-debuginfo-3.0-33.2.el5_1.2.ppc.rpm
85a01809c690a6684b4d39f589cf78ba tetex-doc-3.0-33.2.el5_1.2.ppc.rpm
d36f0865f96879fd8e154d4bb890c092 tetex-dvips-3.0-33.2.el5_1.2.ppc.rpm
b2c62aaaa82424cd7c46d39d8d3a7ef2 tetex-fonts-3.0-33.2.el5_1.2.ppc.rpm
6e0e98dd3e06ffe93c0c003466c53ffd tetex-latex-3.0-33.2.el5_1.2.ppc.rpm
a7baac84232ddeddd26bc43719676605 tetex-xdvi-3.0-33.2.el5_1.2.ppc.rpm

s390x:
a06beda8f1884944fd8714337b02e5f8 tetex-3.0-33.2.el5_1.2.s390x.rpm
d19f6c8e75e73a1aa3f9a5a7227189e6 tetex-afm-3.0-33.2.el5_1.2.s390x.rpm
937e7a798bb900f93d0e499706313102 tetex-debuginfo-3.0-33.2.el5_1.2.s390x.rpm
314aaf805fa9908c5bd8dd066a78ee69 tetex-doc-3.0-33.2.el5_1.2.s390x.rpm
ffeeb98bc3d453d766f6834f681018e2 tetex-dvips-3.0-33.2.el5_1.2.s390x.rpm
bc495169336a4193e62573c91ca98e08 tetex-fonts-3.0-33.2.el5_1.2.s390x.rpm
27817f1ec00502caa8ab74c0dea42e8b tetex-latex-3.0-33.2.el5_1.2.s390x.rpm
051531181be471e4afbea3cc76e0087b tetex-xdvi-3.0-33.2.el5_1.2.s390x.rpm

x86_64:
7a6307a6176d11dd21ec38a79260d5a1 tetex-3.0-33.2.el5_1.2.x86_64.rpm
3dbdc412d3a9a189af7b62988e984db9 tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm
2e422824056f6c01c354e8c32de5da7e tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm
3b43cf065dbdb05fb6c6114ff73960d2 tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm
ed0a4845c96a539aead363cd53eeee14 tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm
b14ed77067e9d92450b98d2bb5e31008 tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm
291b02f4ab3ce4f51f87bd525b09adef tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm
a21bff151a307f6c1124f15fc609f0d4 tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

 

TOP