Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0896 -- [RedHat] Important: tetex security update 9 November 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tetex Publisher: Red Hat Operating System: Red Hat Linux 4 Red Hat Linux 5 Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-5393 CVE-2007-5392 CVE-2007-4352 CVE-2007-4033 Ref: ESB-2007.0888 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-1027.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: tetex security update Advisory ID: RHSA-2007:1027-02 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1027.html Issue date: 2007-11-08 Updated on: 2007-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-4033 CVE-2007-4352 CVE-2007-5392 CVE-2007-5393 - - --------------------------------------------------------------------- 1. Summary: Updated tetex packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: TeTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (dvi) file as output. Alin Rad Pop discovered several flaws in the handling of PDF files. An attacker could create a malicious PDF file that would cause TeTeX to crash or potentially execute arbitrary code when opened. (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393) A flaw was found in the t1lib library, used in the handling of Type 1 fonts. An attacker could create a malicious file that would cause TeTeX to crash, or potentially execute arbitrary code when opened. (CVE-2007-4033) Users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 345101 - CVE-2007-4352 xpdf memory corruption in DCTStream::readProgressiveDataUnit() 345111 - CVE-2007-5392 xpdf buffer overflow in DCTStream::reset() 345121 - CVE-2007-5393 xpdf buffer overflow in CCITTFaxStream::lookChar() 352271 - CVE-2007-4033 t1lib font filename string overflow 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm i386: 027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm 2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm 66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm 340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm ia64: e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm 597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm 12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm 60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm 424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm 7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm ppc: 1362563a88035d1b5e568c3342e4ac27 tetex-2.0.2-22.0.1.EL4.10.ppc.rpm 83244a2db4c8bd99d4cb38cdf4844551 tetex-afm-2.0.2-22.0.1.EL4.10.ppc.rpm f7ff046449533d6e7c3707e238c3de77 tetex-debuginfo-2.0.2-22.0.1.EL4.10.ppc.rpm 4707560e62f573407de9c3f611e06004 tetex-doc-2.0.2-22.0.1.EL4.10.ppc.rpm 1a4a981d8f4d1627207eec38d5b7b23b tetex-dvips-2.0.2-22.0.1.EL4.10.ppc.rpm d8fd2d03c0c02c8f2e7f31560d8ea937 tetex-fonts-2.0.2-22.0.1.EL4.10.ppc.rpm 5820a8afd235502f0a398a689dd6a62d tetex-latex-2.0.2-22.0.1.EL4.10.ppc.rpm 4f3648c6fc71c75e6b86836a98c4866a tetex-xdvi-2.0.2-22.0.1.EL4.10.ppc.rpm s390: a3b525ffbd450b2167e68831c2b55b73 tetex-2.0.2-22.0.1.EL4.10.s390.rpm 4b0d73456a23c998c4ec04fb22c23ddb tetex-afm-2.0.2-22.0.1.EL4.10.s390.rpm 8af45d912827f0cf5963f269d18a52e0 tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390.rpm f29a2b2a4c21c9cf104be216c6a5b0fe tetex-doc-2.0.2-22.0.1.EL4.10.s390.rpm d41e8fd19df69be9e1f34fb1dada735f tetex-dvips-2.0.2-22.0.1.EL4.10.s390.rpm ff2526d5aa53852065ffee38b490cd67 tetex-fonts-2.0.2-22.0.1.EL4.10.s390.rpm baa804414ce7c1a7cdc443dd8e0a0dcd tetex-latex-2.0.2-22.0.1.EL4.10.s390.rpm 0b7943a6d9800d90d4dbacac0302d531 tetex-xdvi-2.0.2-22.0.1.EL4.10.s390.rpm s390x: 43976716352f385d87865db38ea615af tetex-2.0.2-22.0.1.EL4.10.s390x.rpm c644606a45f5a83ef9818973990325ea tetex-afm-2.0.2-22.0.1.EL4.10.s390x.rpm e6316aeb56d2e6153f77bcc5fba3791d tetex-debuginfo-2.0.2-22.0.1.EL4.10.s390x.rpm abacd59736f4169de95bfcf2382afa55 tetex-doc-2.0.2-22.0.1.EL4.10.s390x.rpm f99dbe4de2733668786ee110f4896ed7 tetex-dvips-2.0.2-22.0.1.EL4.10.s390x.rpm b39ab1c0dc6a27c50f1611475402c26a tetex-fonts-2.0.2-22.0.1.EL4.10.s390x.rpm 4ce12256a2a348f11cbfa9e368e2c734 tetex-latex-2.0.2-22.0.1.EL4.10.s390x.rpm 92b7f3c840d5523de4f979f015a3d062 tetex-xdvi-2.0.2-22.0.1.EL4.10.s390x.rpm x86_64: 9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm 6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm 75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm 6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm 0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm 5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm i386: 027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm 2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm 66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm 340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm x86_64: 9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm 6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm 75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm 6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm 0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm 5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm i386: 027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm 2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm 66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm 340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm ia64: e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm 597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm 12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm 60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm 424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm 7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm x86_64: 9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm 6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm 75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm 6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm 0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm 5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/tetex-2.0.2-22.0.1.EL4.10.src.rpm ee5da4d13ebc89ca506c862e66a58116 tetex-2.0.2-22.0.1.EL4.10.src.rpm i386: 027c2aebbf12ad46978d7790fa33a564 tetex-2.0.2-22.0.1.EL4.10.i386.rpm 2bc6040e0a781e828d6fd6952904b7cd tetex-afm-2.0.2-22.0.1.EL4.10.i386.rpm 66ec2145039024c7fa16088163a51f51 tetex-debuginfo-2.0.2-22.0.1.EL4.10.i386.rpm f7f973c9e4302e1dc454241af599a0c0 tetex-doc-2.0.2-22.0.1.EL4.10.i386.rpm e526a49d653a71963cc4c6ad83d7d025 tetex-dvips-2.0.2-22.0.1.EL4.10.i386.rpm 340652dbb31b4ce1002dec39ddb149ac tetex-fonts-2.0.2-22.0.1.EL4.10.i386.rpm c66a33f1d2ee030179ef30fad803488d tetex-latex-2.0.2-22.0.1.EL4.10.i386.rpm efd73b36456c5327ee1b24ef47e26f34 tetex-xdvi-2.0.2-22.0.1.EL4.10.i386.rpm ia64: e06c955aba563a4be1d2b633e32ae112 tetex-2.0.2-22.0.1.EL4.10.ia64.rpm 597906ed92b23704e8b822a874040272 tetex-afm-2.0.2-22.0.1.EL4.10.ia64.rpm aa1f7bfdcc4bc73bff9a564d43b10e8c tetex-debuginfo-2.0.2-22.0.1.EL4.10.ia64.rpm dbac70370dbf2e15c4cf10a64e0888bd tetex-doc-2.0.2-22.0.1.EL4.10.ia64.rpm 12e9fb0a0d262e17aec53c700147c704 tetex-dvips-2.0.2-22.0.1.EL4.10.ia64.rpm 60a15ffa5d94e10d5d30735474779695 tetex-fonts-2.0.2-22.0.1.EL4.10.ia64.rpm 424e7335434932c91afbb78068e0b6cc tetex-latex-2.0.2-22.0.1.EL4.10.ia64.rpm 7ff7f7760f339077f54454a9b5941905 tetex-xdvi-2.0.2-22.0.1.EL4.10.ia64.rpm x86_64: 9256a59442be5e16353c6e80c0c6eeb4 tetex-2.0.2-22.0.1.EL4.10.x86_64.rpm 6382a7e46e5ad3d1e329e3620c0c5cb5 tetex-afm-2.0.2-22.0.1.EL4.10.x86_64.rpm f5dd4fcfcaa58b85e1c8b19793106f96 tetex-debuginfo-2.0.2-22.0.1.EL4.10.x86_64.rpm 75373e789b643c8fa2fc93765e6970cd tetex-doc-2.0.2-22.0.1.EL4.10.x86_64.rpm f23f9a67113c9dc617423782f7f86d0c tetex-dvips-2.0.2-22.0.1.EL4.10.x86_64.rpm 6d9ec577c3ca1a1de2765058437a7176 tetex-fonts-2.0.2-22.0.1.EL4.10.x86_64.rpm 0281b2119f411044713b3681d79672e4 tetex-latex-2.0.2-22.0.1.EL4.10.x86_64.rpm 5adea0e5b6eb555d771445594ca09051 tetex-xdvi-2.0.2-22.0.1.EL4.10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm b1b42ba1708170366ef929542721e792 tetex-3.0-33.2.el5_1.2.src.rpm i386: 1fbc3969e96b466560c90814b25aebe5 tetex-3.0-33.2.el5_1.2.i386.rpm 440c373bdd22150fa5ad4804f078fec6 tetex-afm-3.0-33.2.el5_1.2.i386.rpm 1eb33138cf83a75a380ad06bf50ac645 tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm b5086ee4832639db57282878a9b4aa4c tetex-doc-3.0-33.2.el5_1.2.i386.rpm 0568b6191a2f33f0b5ea028e419c0194 tetex-dvips-3.0-33.2.el5_1.2.i386.rpm 31fcdbc3370b30c2c665e86b5ca130a5 tetex-fonts-3.0-33.2.el5_1.2.i386.rpm b2aae2adc2955a745774c227e4e335df tetex-latex-3.0-33.2.el5_1.2.i386.rpm 6c708669d258dc905000c1d20d18ad91 tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm x86_64: 7a6307a6176d11dd21ec38a79260d5a1 tetex-3.0-33.2.el5_1.2.x86_64.rpm 3dbdc412d3a9a189af7b62988e984db9 tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm 2e422824056f6c01c354e8c32de5da7e tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm 3b43cf065dbdb05fb6c6114ff73960d2 tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm ed0a4845c96a539aead363cd53eeee14 tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm b14ed77067e9d92450b98d2bb5e31008 tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm 291b02f4ab3ce4f51f87bd525b09adef tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm a21bff151a307f6c1124f15fc609f0d4 tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tetex-3.0-33.2.el5_1.2.src.rpm b1b42ba1708170366ef929542721e792 tetex-3.0-33.2.el5_1.2.src.rpm i386: 1fbc3969e96b466560c90814b25aebe5 tetex-3.0-33.2.el5_1.2.i386.rpm 440c373bdd22150fa5ad4804f078fec6 tetex-afm-3.0-33.2.el5_1.2.i386.rpm 1eb33138cf83a75a380ad06bf50ac645 tetex-debuginfo-3.0-33.2.el5_1.2.i386.rpm b5086ee4832639db57282878a9b4aa4c tetex-doc-3.0-33.2.el5_1.2.i386.rpm 0568b6191a2f33f0b5ea028e419c0194 tetex-dvips-3.0-33.2.el5_1.2.i386.rpm 31fcdbc3370b30c2c665e86b5ca130a5 tetex-fonts-3.0-33.2.el5_1.2.i386.rpm b2aae2adc2955a745774c227e4e335df tetex-latex-3.0-33.2.el5_1.2.i386.rpm 6c708669d258dc905000c1d20d18ad91 tetex-xdvi-3.0-33.2.el5_1.2.i386.rpm ia64: f14401b2d2014defb1b54995368948f2 tetex-3.0-33.2.el5_1.2.ia64.rpm 965666eb86b632b64019a082dacd40ba tetex-afm-3.0-33.2.el5_1.2.ia64.rpm 3a2a99f272ac94c40054053d54e54037 tetex-debuginfo-3.0-33.2.el5_1.2.ia64.rpm 8273756d1787fb0fa59c61520e0b13ef tetex-doc-3.0-33.2.el5_1.2.ia64.rpm a98808f0b6242a235086ea8995623dfd tetex-dvips-3.0-33.2.el5_1.2.ia64.rpm 4582e88c285f14755def63dbd7b95d70 tetex-fonts-3.0-33.2.el5_1.2.ia64.rpm 330c602f426255fca1ce4e9bdda1e9d9 tetex-latex-3.0-33.2.el5_1.2.ia64.rpm f781a1659fb4f1edfa733fe478bff0c7 tetex-xdvi-3.0-33.2.el5_1.2.ia64.rpm ppc: 433c7e0dacb9204070eb4e1b91db5a6d tetex-3.0-33.2.el5_1.2.ppc.rpm 51b25740e8c0a82337015af7c8a7a6b4 tetex-afm-3.0-33.2.el5_1.2.ppc.rpm 991d10cdd08bae2e414647faebb91f1b tetex-debuginfo-3.0-33.2.el5_1.2.ppc.rpm 85a01809c690a6684b4d39f589cf78ba tetex-doc-3.0-33.2.el5_1.2.ppc.rpm d36f0865f96879fd8e154d4bb890c092 tetex-dvips-3.0-33.2.el5_1.2.ppc.rpm b2c62aaaa82424cd7c46d39d8d3a7ef2 tetex-fonts-3.0-33.2.el5_1.2.ppc.rpm 6e0e98dd3e06ffe93c0c003466c53ffd tetex-latex-3.0-33.2.el5_1.2.ppc.rpm a7baac84232ddeddd26bc43719676605 tetex-xdvi-3.0-33.2.el5_1.2.ppc.rpm s390x: a06beda8f1884944fd8714337b02e5f8 tetex-3.0-33.2.el5_1.2.s390x.rpm d19f6c8e75e73a1aa3f9a5a7227189e6 tetex-afm-3.0-33.2.el5_1.2.s390x.rpm 937e7a798bb900f93d0e499706313102 tetex-debuginfo-3.0-33.2.el5_1.2.s390x.rpm 314aaf805fa9908c5bd8dd066a78ee69 tetex-doc-3.0-33.2.el5_1.2.s390x.rpm ffeeb98bc3d453d766f6834f681018e2 tetex-dvips-3.0-33.2.el5_1.2.s390x.rpm bc495169336a4193e62573c91ca98e08 tetex-fonts-3.0-33.2.el5_1.2.s390x.rpm 27817f1ec00502caa8ab74c0dea42e8b tetex-latex-3.0-33.2.el5_1.2.s390x.rpm 051531181be471e4afbea3cc76e0087b tetex-xdvi-3.0-33.2.el5_1.2.s390x.rpm x86_64: 7a6307a6176d11dd21ec38a79260d5a1 tetex-3.0-33.2.el5_1.2.x86_64.rpm 3dbdc412d3a9a189af7b62988e984db9 tetex-afm-3.0-33.2.el5_1.2.x86_64.rpm 2e422824056f6c01c354e8c32de5da7e tetex-debuginfo-3.0-33.2.el5_1.2.x86_64.rpm 3b43cf065dbdb05fb6c6114ff73960d2 tetex-doc-3.0-33.2.el5_1.2.x86_64.rpm ed0a4845c96a539aead363cd53eeee14 tetex-dvips-3.0-33.2.el5_1.2.x86_64.rpm b14ed77067e9d92450b98d2bb5e31008 tetex-fonts-3.0-33.2.el5_1.2.x86_64.rpm 291b02f4ab3ce4f51f87bd525b09adef tetex-latex-3.0-33.2.el5_1.2.x86_64.rpm a21bff151a307f6c1124f15fc609f0d4 tetex-xdvi-3.0-33.2.el5_1.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFHMxOrXlSAg2UNWIIRAhM5AJ0aGj+cDCJ6BTYrXUUbSDR0raiQ8QCffXeX zlvUUcz/UJ0gZLsnWuvGwrY= =2oXF - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRzPUzCh9+71yA2DNAQIJUAP+KYBWNwtg51JxwMhFXq52sPZEqgG7hrlK 9+utdYx7k+ET+AajGzq5iCQISAnmrj5OB95PbktiYsdRkQUw+Bs+NavNCTmL78fE nN4xXF1oH0/6SegdiV4uPElIo7PPxMPQkJYqOR6cPnhVGWyNqyGdrnBAJNJK8JGK WyATN50/1Rs= =NHBt -----END PGP SIGNATURE-----