Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0064 -- [UNIX/Linux][RedHat] Moderate: tetex security update 20 January 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tetex Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Enterprise Linux Desktop 4 Red Hat Enterprise Linux AS/ES/WS 3 Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 2.1 Red Hat Linux Advanced Workstation 2.1 UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2005-3628 CVE-2005-3627 CVE-2005-3626 CVE-2005-3625 CVE-2005-3624 CVE-2005-3193 CVE-2005-3192 CVE-2005-3191 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0160.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: tetex security update Advisory ID: RHSA-2006:0160-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0160.html Issue date: 2006-01-19 Updated on: 2006-01-19 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 - - --------------------------------------------------------------------- 1. Summary: Updated tetex packages that fix several integer overflows are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVice Independent) file as output. Several flaws were discovered in the teTeX PDF parsing library. An attacker could construct a carefully crafted PDF file that could cause teTeX to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the names CVE-2005-3191, CVE-2005-3192, CVE-2005-3193, CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, CVE-2005-3627 and CVE-2005-3628 to these issues. Users of teTeX should upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 175109 - CVE-2005-3193 xpdf issues (CVE-2005-3191 CVE-2005-3192 CVE-2005-3628) 177127 - [RHEL4] CVE-2005-3624 Additional xpdf issues (CVE-2005-3625 CVE-2005-3626 CVE-2005-3627) 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/tetex-1.0.7-38.5E.10.src.rpm bda20599634a1b7eb6659af2d4b79355 tetex-1.0.7-38.5E.10.src.rpm i386: 49ad782111536a8865d84e32bd152c75 tetex-1.0.7-38.5E.10.i386.rpm 09aee441b65b61911936975d7a00cba5 tetex-afm-1.0.7-38.5E.10.i386.rpm 2ab912ed02b21837a5d87e3032acfe9e tetex-doc-1.0.7-38.5E.10.i386.rpm 633ee7d169e067441afc3ff0e28d037c tetex-dvilj-1.0.7-38.5E.10.i386.rpm 79917d5cbf16c268ef9bf314f258574c tetex-dvips-1.0.7-38.5E.10.i386.rpm 138bf3a916b828dc9c5b229fd52a518f tetex-fonts-1.0.7-38.5E.10.i386.rpm 20eec31604be2f4532499502c0085936 tetex-latex-1.0.7-38.5E.10.i386.rpm ed4abd2f1ec726f5de093b89073fa252 tetex-xdvi-1.0.7-38.5E.10.i386.rpm ia64: 7c5f308b07c6ae053ddbfbb74f0affe8 tetex-1.0.7-38.5E.10.ia64.rpm 0ca8d0ec93018aa49a664d1956de168d tetex-afm-1.0.7-38.5E.10.ia64.rpm 08fac4824ccbc09202bcd5bdb8fcbb0d tetex-doc-1.0.7-38.5E.10.ia64.rpm 8b9d4ebe92c739476fe0796258c92fa0 tetex-dvilj-1.0.7-38.5E.10.ia64.rpm 26a05ef2f7b5d1dfcebde8a4aff00ccc tetex-dvips-1.0.7-38.5E.10.ia64.rpm 267e6d3624520709317aa8ea971386e1 tetex-fonts-1.0.7-38.5E.10.ia64.rpm 17d240a7925c365a0ef4bbd92f7a0c91 tetex-latex-1.0.7-38.5E.10.ia64.rpm 29e146f10fbd41d4212cee14c6e480c4 tetex-xdvi-1.0.7-38.5E.10.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/tetex-1.0.7-38.5E.10.src.rpm bda20599634a1b7eb6659af2d4b79355 tetex-1.0.7-38.5E.10.src.rpm ia64: 7c5f308b07c6ae053ddbfbb74f0affe8 tetex-1.0.7-38.5E.10.ia64.rpm 0ca8d0ec93018aa49a664d1956de168d tetex-afm-1.0.7-38.5E.10.ia64.rpm 08fac4824ccbc09202bcd5bdb8fcbb0d tetex-doc-1.0.7-38.5E.10.ia64.rpm 8b9d4ebe92c739476fe0796258c92fa0 tetex-dvilj-1.0.7-38.5E.10.ia64.rpm 26a05ef2f7b5d1dfcebde8a4aff00ccc tetex-dvips-1.0.7-38.5E.10.ia64.rpm 267e6d3624520709317aa8ea971386e1 tetex-fonts-1.0.7-38.5E.10.ia64.rpm 17d240a7925c365a0ef4bbd92f7a0c91 tetex-latex-1.0.7-38.5E.10.ia64.rpm 29e146f10fbd41d4212cee14c6e480c4 tetex-xdvi-1.0.7-38.5E.10.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/tetex-1.0.7-38.5E.10.src.rpm bda20599634a1b7eb6659af2d4b79355 tetex-1.0.7-38.5E.10.src.rpm i386: 49ad782111536a8865d84e32bd152c75 tetex-1.0.7-38.5E.10.i386.rpm 09aee441b65b61911936975d7a00cba5 tetex-afm-1.0.7-38.5E.10.i386.rpm 2ab912ed02b21837a5d87e3032acfe9e tetex-doc-1.0.7-38.5E.10.i386.rpm 633ee7d169e067441afc3ff0e28d037c tetex-dvilj-1.0.7-38.5E.10.i386.rpm 79917d5cbf16c268ef9bf314f258574c tetex-dvips-1.0.7-38.5E.10.i386.rpm 138bf3a916b828dc9c5b229fd52a518f tetex-fonts-1.0.7-38.5E.10.i386.rpm 20eec31604be2f4532499502c0085936 tetex-latex-1.0.7-38.5E.10.i386.rpm ed4abd2f1ec726f5de093b89073fa252 tetex-xdvi-1.0.7-38.5E.10.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/tetex-1.0.7-38.5E.10.src.rpm bda20599634a1b7eb6659af2d4b79355 tetex-1.0.7-38.5E.10.src.rpm i386: 49ad782111536a8865d84e32bd152c75 tetex-1.0.7-38.5E.10.i386.rpm 09aee441b65b61911936975d7a00cba5 tetex-afm-1.0.7-38.5E.10.i386.rpm 2ab912ed02b21837a5d87e3032acfe9e tetex-doc-1.0.7-38.5E.10.i386.rpm 633ee7d169e067441afc3ff0e28d037c tetex-dvilj-1.0.7-38.5E.10.i386.rpm 79917d5cbf16c268ef9bf314f258574c tetex-dvips-1.0.7-38.5E.10.i386.rpm 138bf3a916b828dc9c5b229fd52a518f tetex-fonts-1.0.7-38.5E.10.i386.rpm 20eec31604be2f4532499502c0085936 tetex-latex-1.0.7-38.5E.10.i386.rpm ed4abd2f1ec726f5de093b89073fa252 tetex-xdvi-1.0.7-38.5E.10.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tetex-1.0.7-67.9.src.rpm 0268f08d11ad7331354568f01c5e041b tetex-1.0.7-67.9.src.rpm i386: cd018d33596ba68b8171815e418e4c97 tetex-1.0.7-67.9.i386.rpm 355887b853d836bf574dd0c49d961ca4 tetex-afm-1.0.7-67.9.i386.rpm e24f7bbf95008590ff0477f5f0c5dc9e tetex-dvips-1.0.7-67.9.i386.rpm cfe2d539b18cb4f687f95e1a20b957ca tetex-fonts-1.0.7-67.9.i386.rpm 332a334898a9cbc8949b82a8df735362 tetex-latex-1.0.7-67.9.i386.rpm a66d5a50677b2b6959d8f37c9bf2dcaa tetex-xdvi-1.0.7-67.9.i386.rpm ia64: 8106c18a23d72fe8d69db5ec5edd6477 tetex-1.0.7-67.9.ia64.rpm e89ea9fc7462bef95710cdb9ac920428 tetex-afm-1.0.7-67.9.ia64.rpm 2cae8707475dd1a124962d7c1bd20222 tetex-dvips-1.0.7-67.9.ia64.rpm c80531149db62bb58e066e45b250aa42 tetex-fonts-1.0.7-67.9.ia64.rpm 2732c1eadb3b429d0ee2a57a7509301c tetex-latex-1.0.7-67.9.ia64.rpm 22ae0f737ba3bf9242232533298276db tetex-xdvi-1.0.7-67.9.ia64.rpm ppc: 9a8df8e0f6fe22893861807a883d6587 tetex-1.0.7-67.9.ppc.rpm 2a35cd6a5f02c0d0f95b5116392cc6ec tetex-afm-1.0.7-67.9.ppc.rpm 2fd849b578bf79a8b2534eab0a43ee30 tetex-dvips-1.0.7-67.9.ppc.rpm 6205fc3eb72b4d1da5bfe5ac5f56972e tetex-fonts-1.0.7-67.9.ppc.rpm a6f71bf1389ec582e3d30c684cfc25d7 tetex-latex-1.0.7-67.9.ppc.rpm 5ecd866f6a531bc1bc60edd43a82b43b tetex-xdvi-1.0.7-67.9.ppc.rpm s390: c8d78050dc52318c6b5ccd8f444d4f90 tetex-1.0.7-67.9.s390.rpm cb31a11677099f49f3a037f3da8f33dc tetex-afm-1.0.7-67.9.s390.rpm b5ca8390bed3cbfe7cb5adc910bc5b7c tetex-dvips-1.0.7-67.9.s390.rpm 945e7ca4dc9dcc7bf0eed16c1a02d0d6 tetex-fonts-1.0.7-67.9.s390.rpm 485fc1246cefb9a9ba6bc4858f5605cb tetex-latex-1.0.7-67.9.s390.rpm 10c842b3423053ffc5264a721bf742d5 tetex-xdvi-1.0.7-67.9.s390.rpm s390x: ea2d7cd2e7506828cb3de50f9b7d7f5d tetex-1.0.7-67.9.s390x.rpm 80755804b8559dfccb346c52e414476e tetex-afm-1.0.7-67.9.s390x.rpm 055017741612116f5363f3ce414af9ab tetex-dvips-1.0.7-67.9.s390x.rpm 9a4fdf8dff88a73ee8e9865a80f07cd7 tetex-fonts-1.0.7-67.9.s390x.rpm d9455bedff75da5b12bc146c78840d96 tetex-latex-1.0.7-67.9.s390x.rpm b27f3eb65c68312804020680f88dd8e3 tetex-xdvi-1.0.7-67.9.s390x.rpm x86_64: 38df50c7c489523a0df80a038d58ea89 tetex-1.0.7-67.9.x86_64.rpm 3ca12e8812c7a7040a85fc6200976681 tetex-afm-1.0.7-67.9.x86_64.rpm f80cccf1398cba3a6f294653f94e9f61 tetex-dvips-1.0.7-67.9.x86_64.rpm 60309df57c823357d06d1966109fce2d tetex-fonts-1.0.7-67.9.x86_64.rpm 72208e3607d54f2d05d94985c2859cf2 tetex-latex-1.0.7-67.9.x86_64.rpm 0300207904ba07c93b0042d08ba392c3 tetex-xdvi-1.0.7-67.9.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tetex-1.0.7-67.9.src.rpm 0268f08d11ad7331354568f01c5e041b tetex-1.0.7-67.9.src.rpm i386: cd018d33596ba68b8171815e418e4c97 tetex-1.0.7-67.9.i386.rpm 355887b853d836bf574dd0c49d961ca4 tetex-afm-1.0.7-67.9.i386.rpm e24f7bbf95008590ff0477f5f0c5dc9e tetex-dvips-1.0.7-67.9.i386.rpm cfe2d539b18cb4f687f95e1a20b957ca tetex-fonts-1.0.7-67.9.i386.rpm 332a334898a9cbc8949b82a8df735362 tetex-latex-1.0.7-67.9.i386.rpm a66d5a50677b2b6959d8f37c9bf2dcaa tetex-xdvi-1.0.7-67.9.i386.rpm x86_64: 38df50c7c489523a0df80a038d58ea89 tetex-1.0.7-67.9.x86_64.rpm 3ca12e8812c7a7040a85fc6200976681 tetex-afm-1.0.7-67.9.x86_64.rpm f80cccf1398cba3a6f294653f94e9f61 tetex-dvips-1.0.7-67.9.x86_64.rpm 60309df57c823357d06d1966109fce2d tetex-fonts-1.0.7-67.9.x86_64.rpm 72208e3607d54f2d05d94985c2859cf2 tetex-latex-1.0.7-67.9.x86_64.rpm 0300207904ba07c93b0042d08ba392c3 tetex-xdvi-1.0.7-67.9.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tetex-1.0.7-67.9.src.rpm 0268f08d11ad7331354568f01c5e041b tetex-1.0.7-67.9.src.rpm i386: cd018d33596ba68b8171815e418e4c97 tetex-1.0.7-67.9.i386.rpm 355887b853d836bf574dd0c49d961ca4 tetex-afm-1.0.7-67.9.i386.rpm e24f7bbf95008590ff0477f5f0c5dc9e tetex-dvips-1.0.7-67.9.i386.rpm cfe2d539b18cb4f687f95e1a20b957ca tetex-fonts-1.0.7-67.9.i386.rpm 332a334898a9cbc8949b82a8df735362 tetex-latex-1.0.7-67.9.i386.rpm a66d5a50677b2b6959d8f37c9bf2dcaa tetex-xdvi-1.0.7-67.9.i386.rpm ia64: 8106c18a23d72fe8d69db5ec5edd6477 tetex-1.0.7-67.9.ia64.rpm e89ea9fc7462bef95710cdb9ac920428 tetex-afm-1.0.7-67.9.ia64.rpm 2cae8707475dd1a124962d7c1bd20222 tetex-dvips-1.0.7-67.9.ia64.rpm c80531149db62bb58e066e45b250aa42 tetex-fonts-1.0.7-67.9.ia64.rpm 2732c1eadb3b429d0ee2a57a7509301c tetex-latex-1.0.7-67.9.ia64.rpm 22ae0f737ba3bf9242232533298276db tetex-xdvi-1.0.7-67.9.ia64.rpm x86_64: 38df50c7c489523a0df80a038d58ea89 tetex-1.0.7-67.9.x86_64.rpm 3ca12e8812c7a7040a85fc6200976681 tetex-afm-1.0.7-67.9.x86_64.rpm f80cccf1398cba3a6f294653f94e9f61 tetex-dvips-1.0.7-67.9.x86_64.rpm 60309df57c823357d06d1966109fce2d tetex-fonts-1.0.7-67.9.x86_64.rpm 72208e3607d54f2d05d94985c2859cf2 tetex-latex-1.0.7-67.9.x86_64.rpm 0300207904ba07c93b0042d08ba392c3 tetex-xdvi-1.0.7-67.9.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tetex-1.0.7-67.9.src.rpm 0268f08d11ad7331354568f01c5e041b tetex-1.0.7-67.9.src.rpm i386: cd018d33596ba68b8171815e418e4c97 tetex-1.0.7-67.9.i386.rpm 355887b853d836bf574dd0c49d961ca4 tetex-afm-1.0.7-67.9.i386.rpm e24f7bbf95008590ff0477f5f0c5dc9e tetex-dvips-1.0.7-67.9.i386.rpm cfe2d539b18cb4f687f95e1a20b957ca tetex-fonts-1.0.7-67.9.i386.rpm 332a334898a9cbc8949b82a8df735362 tetex-latex-1.0.7-67.9.i386.rpm a66d5a50677b2b6959d8f37c9bf2dcaa tetex-xdvi-1.0.7-67.9.i386.rpm ia64: 8106c18a23d72fe8d69db5ec5edd6477 tetex-1.0.7-67.9.ia64.rpm e89ea9fc7462bef95710cdb9ac920428 tetex-afm-1.0.7-67.9.ia64.rpm 2cae8707475dd1a124962d7c1bd20222 tetex-dvips-1.0.7-67.9.ia64.rpm c80531149db62bb58e066e45b250aa42 tetex-fonts-1.0.7-67.9.ia64.rpm 2732c1eadb3b429d0ee2a57a7509301c tetex-latex-1.0.7-67.9.ia64.rpm 22ae0f737ba3bf9242232533298276db tetex-xdvi-1.0.7-67.9.ia64.rpm x86_64: 38df50c7c489523a0df80a038d58ea89 tetex-1.0.7-67.9.x86_64.rpm 3ca12e8812c7a7040a85fc6200976681 tetex-afm-1.0.7-67.9.x86_64.rpm f80cccf1398cba3a6f294653f94e9f61 tetex-dvips-1.0.7-67.9.x86_64.rpm 60309df57c823357d06d1966109fce2d tetex-fonts-1.0.7-67.9.x86_64.rpm 72208e3607d54f2d05d94985c2859cf2 tetex-latex-1.0.7-67.9.x86_64.rpm 0300207904ba07c93b0042d08ba392c3 tetex-xdvi-1.0.7-67.9.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tetex-2.0.2-22.EL4.7.src.rpm ae21b3aa7adc43658288cba0d5578f20 tetex-2.0.2-22.EL4.7.src.rpm i386: 94e7ba8fa76583eaa1865784396574a2 tetex-2.0.2-22.EL4.7.i386.rpm 0deb406e3c8da537a03f1c8e782f8e8e tetex-afm-2.0.2-22.EL4.7.i386.rpm 3af95fe67a305c4e16d86a75eb1169ea tetex-doc-2.0.2-22.EL4.7.i386.rpm 89ac40395af3e88a990b6c50eb90ee10 tetex-dvips-2.0.2-22.EL4.7.i386.rpm 0925f9cf8f6a3210aa6c36c13467c75e tetex-fonts-2.0.2-22.EL4.7.i386.rpm 7b2595c6a4800fdb1f5f1cf70d72d0ff tetex-latex-2.0.2-22.EL4.7.i386.rpm 537ca25fef48f720dffa5e3c36cad0c0 tetex-xdvi-2.0.2-22.EL4.7.i386.rpm ia64: a49955da66569d4a592202e3952d1821 tetex-2.0.2-22.EL4.7.ia64.rpm 38d74b236db5ce8a2e1d66f153d39c75 tetex-afm-2.0.2-22.EL4.7.ia64.rpm 5b732db0a9e5e662576409cb6f43e4c1 tetex-doc-2.0.2-22.EL4.7.ia64.rpm a4817364ec824fbe9b5dee99a2493199 tetex-dvips-2.0.2-22.EL4.7.ia64.rpm 6ebd4dea9c2ea23b23993212fb797b47 tetex-fonts-2.0.2-22.EL4.7.ia64.rpm ddf78cdea116b8683b8cea3fc5dfb0d7 tetex-latex-2.0.2-22.EL4.7.ia64.rpm 52027a6f5692fde0ced8a95bf44052ec tetex-xdvi-2.0.2-22.EL4.7.ia64.rpm ppc: 982a149c16827afe8de46e41201495ea tetex-2.0.2-22.EL4.7.ppc.rpm 614e284e6d0adbbebcf36c6ba25a58e6 tetex-afm-2.0.2-22.EL4.7.ppc.rpm f15e0c1cf47f81c0e91f9c97b838f6a6 tetex-doc-2.0.2-22.EL4.7.ppc.rpm 3c7d289dcc1f86ca42e01d96c55cbf7d tetex-dvips-2.0.2-22.EL4.7.ppc.rpm 117878fac691d1220c569b5dfe26979e tetex-fonts-2.0.2-22.EL4.7.ppc.rpm 23bc4b0eb0a8e20fea5eec84300a92b7 tetex-latex-2.0.2-22.EL4.7.ppc.rpm f3360a150ef438d23eef81cfcc55c93b tetex-xdvi-2.0.2-22.EL4.7.ppc.rpm s390: f2ff8dbe01920ddedc162794c4d399fd tetex-2.0.2-22.EL4.7.s390.rpm bbb0d3a0eaf65b0348f45bb3e11bf7a6 tetex-afm-2.0.2-22.EL4.7.s390.rpm c8b7702f8be5d228e71e1b92f8b0bdef tetex-doc-2.0.2-22.EL4.7.s390.rpm 42e5ed41f40febc931e788159b84deaf tetex-dvips-2.0.2-22.EL4.7.s390.rpm 7c5a50ca2b3ebc712effc7260647f08d tetex-fonts-2.0.2-22.EL4.7.s390.rpm 6fb5929f62f9001210dc2e8a2370a1c9 tetex-latex-2.0.2-22.EL4.7.s390.rpm f1ec26e7b6d7a7a058966d794f28f4c3 tetex-xdvi-2.0.2-22.EL4.7.s390.rpm s390x: 44a72477c181a850f9774637b15ccfc4 tetex-2.0.2-22.EL4.7.s390x.rpm 7e7b6ff87468e661115745b426d894d6 tetex-afm-2.0.2-22.EL4.7.s390x.rpm ba933e8a346b186198b36fd8bf3825a0 tetex-doc-2.0.2-22.EL4.7.s390x.rpm 52196ea55bd1922f1d2807d1e8f3cf0c tetex-dvips-2.0.2-22.EL4.7.s390x.rpm 77ab77d0c81abd7e36df57ba50d8bce7 tetex-fonts-2.0.2-22.EL4.7.s390x.rpm 326ea9c59546b03ec0635f7561afcf74 tetex-latex-2.0.2-22.EL4.7.s390x.rpm 82da45db386f25c0d5c30f4645cda51e tetex-xdvi-2.0.2-22.EL4.7.s390x.rpm x86_64: 4b98bfd00faf3612bba0e8166af00bde tetex-2.0.2-22.EL4.7.x86_64.rpm 04ed2a0f8630b2a81c4c5e3852bd1780 tetex-afm-2.0.2-22.EL4.7.x86_64.rpm 7e5f82fe31992dec39c07dd9ca2178e6 tetex-doc-2.0.2-22.EL4.7.x86_64.rpm 11f081fec299c4372296b28347e7cb1f tetex-dvips-2.0.2-22.EL4.7.x86_64.rpm 086fe1bbbb4afe1c26cf3d64d669679c tetex-fonts-2.0.2-22.EL4.7.x86_64.rpm ba352432a6da1ec3c2ac0c0dab231530 tetex-latex-2.0.2-22.EL4.7.x86_64.rpm babe8ba23615d6feaf5526f7201bcbd4 tetex-xdvi-2.0.2-22.EL4.7.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tetex-2.0.2-22.EL4.7.src.rpm ae21b3aa7adc43658288cba0d5578f20 tetex-2.0.2-22.EL4.7.src.rpm i386: 94e7ba8fa76583eaa1865784396574a2 tetex-2.0.2-22.EL4.7.i386.rpm 0deb406e3c8da537a03f1c8e782f8e8e tetex-afm-2.0.2-22.EL4.7.i386.rpm 3af95fe67a305c4e16d86a75eb1169ea tetex-doc-2.0.2-22.EL4.7.i386.rpm 89ac40395af3e88a990b6c50eb90ee10 tetex-dvips-2.0.2-22.EL4.7.i386.rpm 0925f9cf8f6a3210aa6c36c13467c75e tetex-fonts-2.0.2-22.EL4.7.i386.rpm 7b2595c6a4800fdb1f5f1cf70d72d0ff tetex-latex-2.0.2-22.EL4.7.i386.rpm 537ca25fef48f720dffa5e3c36cad0c0 tetex-xdvi-2.0.2-22.EL4.7.i386.rpm x86_64: 4b98bfd00faf3612bba0e8166af00bde tetex-2.0.2-22.EL4.7.x86_64.rpm 04ed2a0f8630b2a81c4c5e3852bd1780 tetex-afm-2.0.2-22.EL4.7.x86_64.rpm 7e5f82fe31992dec39c07dd9ca2178e6 tetex-doc-2.0.2-22.EL4.7.x86_64.rpm 11f081fec299c4372296b28347e7cb1f tetex-dvips-2.0.2-22.EL4.7.x86_64.rpm 086fe1bbbb4afe1c26cf3d64d669679c tetex-fonts-2.0.2-22.EL4.7.x86_64.rpm ba352432a6da1ec3c2ac0c0dab231530 tetex-latex-2.0.2-22.EL4.7.x86_64.rpm babe8ba23615d6feaf5526f7201bcbd4 tetex-xdvi-2.0.2-22.EL4.7.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tetex-2.0.2-22.EL4.7.src.rpm ae21b3aa7adc43658288cba0d5578f20 tetex-2.0.2-22.EL4.7.src.rpm i386: 94e7ba8fa76583eaa1865784396574a2 tetex-2.0.2-22.EL4.7.i386.rpm 0deb406e3c8da537a03f1c8e782f8e8e tetex-afm-2.0.2-22.EL4.7.i386.rpm 3af95fe67a305c4e16d86a75eb1169ea tetex-doc-2.0.2-22.EL4.7.i386.rpm 89ac40395af3e88a990b6c50eb90ee10 tetex-dvips-2.0.2-22.EL4.7.i386.rpm 0925f9cf8f6a3210aa6c36c13467c75e tetex-fonts-2.0.2-22.EL4.7.i386.rpm 7b2595c6a4800fdb1f5f1cf70d72d0ff tetex-latex-2.0.2-22.EL4.7.i386.rpm 537ca25fef48f720dffa5e3c36cad0c0 tetex-xdvi-2.0.2-22.EL4.7.i386.rpm ia64: a49955da66569d4a592202e3952d1821 tetex-2.0.2-22.EL4.7.ia64.rpm 38d74b236db5ce8a2e1d66f153d39c75 tetex-afm-2.0.2-22.EL4.7.ia64.rpm 5b732db0a9e5e662576409cb6f43e4c1 tetex-doc-2.0.2-22.EL4.7.ia64.rpm a4817364ec824fbe9b5dee99a2493199 tetex-dvips-2.0.2-22.EL4.7.ia64.rpm 6ebd4dea9c2ea23b23993212fb797b47 tetex-fonts-2.0.2-22.EL4.7.ia64.rpm ddf78cdea116b8683b8cea3fc5dfb0d7 tetex-latex-2.0.2-22.EL4.7.ia64.rpm 52027a6f5692fde0ced8a95bf44052ec tetex-xdvi-2.0.2-22.EL4.7.ia64.rpm x86_64: 4b98bfd00faf3612bba0e8166af00bde tetex-2.0.2-22.EL4.7.x86_64.rpm 04ed2a0f8630b2a81c4c5e3852bd1780 tetex-afm-2.0.2-22.EL4.7.x86_64.rpm 7e5f82fe31992dec39c07dd9ca2178e6 tetex-doc-2.0.2-22.EL4.7.x86_64.rpm 11f081fec299c4372296b28347e7cb1f tetex-dvips-2.0.2-22.EL4.7.x86_64.rpm 086fe1bbbb4afe1c26cf3d64d669679c tetex-fonts-2.0.2-22.EL4.7.x86_64.rpm ba352432a6da1ec3c2ac0c0dab231530 tetex-latex-2.0.2-22.EL4.7.x86_64.rpm babe8ba23615d6feaf5526f7201bcbd4 tetex-xdvi-2.0.2-22.EL4.7.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tetex-2.0.2-22.EL4.7.src.rpm ae21b3aa7adc43658288cba0d5578f20 tetex-2.0.2-22.EL4.7.src.rpm i386: 94e7ba8fa76583eaa1865784396574a2 tetex-2.0.2-22.EL4.7.i386.rpm 0deb406e3c8da537a03f1c8e782f8e8e tetex-afm-2.0.2-22.EL4.7.i386.rpm 3af95fe67a305c4e16d86a75eb1169ea tetex-doc-2.0.2-22.EL4.7.i386.rpm 89ac40395af3e88a990b6c50eb90ee10 tetex-dvips-2.0.2-22.EL4.7.i386.rpm 0925f9cf8f6a3210aa6c36c13467c75e tetex-fonts-2.0.2-22.EL4.7.i386.rpm 7b2595c6a4800fdb1f5f1cf70d72d0ff tetex-latex-2.0.2-22.EL4.7.i386.rpm 537ca25fef48f720dffa5e3c36cad0c0 tetex-xdvi-2.0.2-22.EL4.7.i386.rpm ia64: a49955da66569d4a592202e3952d1821 tetex-2.0.2-22.EL4.7.ia64.rpm 38d74b236db5ce8a2e1d66f153d39c75 tetex-afm-2.0.2-22.EL4.7.ia64.rpm 5b732db0a9e5e662576409cb6f43e4c1 tetex-doc-2.0.2-22.EL4.7.ia64.rpm a4817364ec824fbe9b5dee99a2493199 tetex-dvips-2.0.2-22.EL4.7.ia64.rpm 6ebd4dea9c2ea23b23993212fb797b47 tetex-fonts-2.0.2-22.EL4.7.ia64.rpm ddf78cdea116b8683b8cea3fc5dfb0d7 tetex-latex-2.0.2-22.EL4.7.ia64.rpm 52027a6f5692fde0ced8a95bf44052ec tetex-xdvi-2.0.2-22.EL4.7.ia64.rpm x86_64: 4b98bfd00faf3612bba0e8166af00bde tetex-2.0.2-22.EL4.7.x86_64.rpm 04ed2a0f8630b2a81c4c5e3852bd1780 tetex-afm-2.0.2-22.EL4.7.x86_64.rpm 7e5f82fe31992dec39c07dd9ca2178e6 tetex-doc-2.0.2-22.EL4.7.x86_64.rpm 11f081fec299c4372296b28347e7cb1f tetex-dvips-2.0.2-22.EL4.7.x86_64.rpm 086fe1bbbb4afe1c26cf3d64d669679c tetex-fonts-2.0.2-22.EL4.7.x86_64.rpm ba352432a6da1ec3c2ac0c0dab231530 tetex-latex-2.0.2-22.EL4.7.x86_64.rpm babe8ba23615d6feaf5526f7201bcbd4 tetex-xdvi-2.0.2-22.EL4.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFDz9KSXlSAg2UNWIIRAn0pAKCViGvklNYA4MsrpStL2RAO5yKqZgCdHvbD MVitjOeuuciAU8tEyOE+QjA= =O+7z - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQ9A4fyh9+71yA2DNAQI8fgP+PScEdHhBZxBcgiXzRwVvtlSqhPssptrO yjA8yYqPhKGDP9b1Jv1W/GU4lcYHsEQvj2qS+LXeO66/H7Zev8X5R0OoYEWAewKd n1r3Ob7KigvYhYkQqdXs90PxHsyaYLhj3Hyoze12dyNcIu92ViPS+MA1pWi7mvwW klBo+IzKEkc= =+BuB -----END PGP SIGNATURE-----