TITLE: Fedora update for tetex SECUNIA ADVISORY ID: SA17955 VERIFY ADVISORY: http://secunia.com/advisories/17955/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA17916 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 802aff298f6378498cdeb9c066907f58 SRPMS/tetex-2.0.2-21.5.src.rpm 3de558321f6874d7f8792c4e2c9c356b x86_64/tetex-2.0.2-21.5.x86_64.rpm 4a5f38be89e62e1e53fc49412e57b49f x86_64/tetex-latex-2.0.2-21.5.x86_64.rpm 6c09295f8a7a7ee13c8fda4fb1666977 x86_64/tetex-xdvi-2.0.2-21.5.x86_64.rpm 92fba9c5adc5833de08718b5b06a8652 x86_64/tetex-dvips-2.0.2-21.5.x86_64.rpm e6164f5961ec833b73d4ed092b746521 x86_64/tetex-afm-2.0.2-21.5.x86_64.rpm c09ca851c6e2eb96da58c7f2c5c14332 x86_64/tetex-fonts-2.0.2-21.5.x86_64.rpm 38d16809b3f7349a39b59909cbeeb8e3 x86_64/tetex-doc-2.0.2-21.5.x86_64.rpm 3f00c57a1f36f1ebed167c330459dbd2 x86_64/debug/tetex-debuginfo-2.0.2-21.5.x86_64.rpm 058258ccc8f766fd3f9421bf7edf6e25 i386/tetex-2.0.2-21.5.i386.rpm c88b931b479a31fc21602dd0313e71fa i386/tetex-latex-2.0.2-21.5.i386.rpm dd3014f1661eec70e9f539f1ca3879ef i386/tetex-xdvi-2.0.2-21.5.i386.rpm a14ea2aa8c1d2a98b6bba78ef6d8e695 i386/tetex-dvips-2.0.2-21.5.i386.rpm 691d45e866472cd14c8a20f736545ad3 i386/tetex-afm-2.0.2-21.5.i386.rpm 4a2db4403fc6c342e8ea0b31ec6f0c4c i386/tetex-fonts-2.0.2-21.5.i386.rpm ea1d7c378365eec467b8a4c73c4fe00e i386/tetex-doc-2.0.2-21.5.i386.rpm adf1bd365b26efec58a4eb02fd9d9d83 i386/debug/tetex-debuginfo-2.0.2-21.5.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ c9c2edbfb432eab99adeb8d12eb0e428 SRPMS/tetex-3.0-7.FC4.src.rpm 89c83c91630e195891736ae8410308ef ppc/tetex-3.0-7.FC4.ppc.rpm 9f12ecf3e09412eb968d686c89500367 ppc/tetex-latex-3.0-7.FC4.ppc.rpm aac1f6547f024e7ccc35a1d917ea0956 ppc/tetex-xdvi-3.0-7.FC4.ppc.rpm 4ce4d696e627851dd50046f55ac4bde0 ppc/tetex-dvips-3.0-7.FC4.ppc.rpm c82cdf20e3decb6691d91a12b15f589b ppc/tetex-afm-3.0-7.FC4.ppc.rpm cf4c487e1edec55ba2c16af7ac5e1630 ppc/tetex-fonts-3.0-7.FC4.ppc.rpm 90a82c0d8708f7a7bb84a74c709a30c6 ppc/tetex-doc-3.0-7.FC4.ppc.rpm 88fecde9225ee34fe960940a654dd0f5 ppc/debug/tetex-debuginfo-3.0-7.FC4.ppc.rpm 4038c55cb0e62b16fca09333914b16ea x86_64/tetex-3.0-7.FC4.x86_64.rpm 4197a02a32c6b0be00a1c8b1115a8eb3 x86_64/tetex-latex-3.0-7.FC4.x86_64.rpm 04bdd2b1b9cc705a5ababff06cc7dbfa x86_64/tetex-xdvi-3.0-7.FC4.x86_64.rpm 29aa8350a9a8f7e09846b710f5cb4634 x86_64/tetex-dvips-3.0-7.FC4.x86_64.rpm f865247d37aa5679a06e7becae57de8d x86_64/tetex-afm-3.0-7.FC4.x86_64.rpm 1872fb9c98352a3d0147221d2a7c3c39 x86_64/tetex-fonts-3.0-7.FC4.x86_64.rpm 0f77f10463678ad413ca7aaa0c8760aa x86_64/tetex-doc-3.0-7.FC4.x86_64.rpm cf6a68c0041f1c0b482905a816f0c64c x86_64/debug/tetex-debuginfo-3.0-7.FC4.x86_64.rpm 49ac41b0799982af0c467191bf49b51a i386/tetex-3.0-7.FC4.i386.rpm a0dada19f3c39db557d0cecc194d3f4f i386/tetex-latex-3.0-7.FC4.i386.rpm ebd5dbed238fb43233f9cfaf9111a51b i386/tetex-xdvi-3.0-7.FC4.i386.rpm 53d0709df7a1105c6643d65e88a7b0b1 i386/tetex-dvips-3.0-7.FC4.i386.rpm 5bab1dd4df5f3b57915a777c6fdeb053 i386/tetex-afm-3.0-7.FC4.i386.rpm c85b4d01615ebd460e7f26345b560765 i386/tetex-fonts-3.0-7.FC4.i386.rpm 10e26b6f01f39716986b6581504ccfda i386/tetex-doc-3.0-7.FC4.i386.rpm 38772851a0226358d85ab8a5db3ab78d i386/debug/tetex-debuginfo-3.0-7.FC4.i386.rpm OTHER REFERENCES: SA17916: http://secunia.com/advisories/17916/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------