TITLE: Fedora update for tetex SECUNIA ADVISORY ID: SA18448 VERIFY ADVISORY: http://secunia.com/advisories/18448/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA17916 SA18329 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ cf7ccd06a85a2a3eaa876706971fe32f5cba66b9 SRPMS/tetex-2.0.2-21.7.FC3.src.rpm c4b3207cd02981b2c6f96ad2e27e2c882664c444 x86_64/tetex-2.0.2-21.7.FC3.x86_64.rpm cfe7477d6307af610983d7b3b4bd8ab1b23026bc x86_64/tetex-latex-2.0.2-21.7.FC3.x86_64.rpm 6de73df47b772f7631692c4c392a02a32630acc4 x86_64/tetex-xdvi-2.0.2-21.7.FC3.x86_64.rpm ec4cc2f62901e9714f5fc0a1e482ac87868a38e3 x86_64/tetex-dvips-2.0.2-21.7.FC3.x86_64.rpm 7b7380a14999d0fb2ea794cf48afea1bf4fcb608 x86_64/tetex-afm-2.0.2-21.7.FC3.x86_64.rpm 5f58c8f32f80ae9f3940918cb77dc4145ac87d15 x86_64/tetex-fonts-2.0.2-21.7.FC3.x86_64.rpm 8269c2c6f763acc64d4b7230b3e2b9e30de0e5e6 x86_64/tetex-doc-2.0.2-21.7.FC3.x86_64.rpm fa6a0fe488ddca27adddf8fd8e86efd5d3c96702 x86_64/debug/tetex-debuginfo-2.0.2-21.7.FC3.x86_64.rpm 0199f223161ef36cc20d6c8d3975bc93cf5b859a i386/tetex-2.0.2-21.7.FC3.i386.rpm ebf60610fcb7883a7fd51fc9149ca0ce39c25f88 i386/tetex-latex-2.0.2-21.7.FC3.i386.rpm 9b33603eaf128f8175b5d6a76b11dc2a1f7938a9 i386/tetex-xdvi-2.0.2-21.7.FC3.i386.rpm 0bca7c80842a921535f9f169873bba67857a9262 i386/tetex-dvips-2.0.2-21.7.FC3.i386.rpm b10d1f4ab980b22f1b8c2998bba514294438e3e4 i386/tetex-afm-2.0.2-21.7.FC3.i386.rpm 439315089cf95886e7e93531df42779a5b3c9225 i386/tetex-fonts-2.0.2-21.7.FC3.i386.rpm 26316d94c329dbc63f732451cd92eac25a376bed i386/tetex-doc-2.0.2-21.7.FC3.i386.rpm 62428a292a5e896a2e13e95ad6dc58be9559af9e i386/debug/tetex-debuginfo-2.0.2-21.7.FC3.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ d5803bb897ac8b307e604d9b5ff872c1ff314565 SRPMS/tetex-3.0-9.FC4.src.rpm ff74404da788d6b5677d6edf10745564bafd43da ppc/tetex-3.0-9.FC4.ppc.rpm 1ddbc8cb532cb20d101e490bb881621c994d8851 ppc/tetex-latex-3.0-9.FC4.ppc.rpm c8329a5c0b491f82d37e7b7024b3d4b0cf2553f1 ppc/tetex-xdvi-3.0-9.FC4.ppc.rpm 7387673a1b7a69582e6f0c4b382430f9c71c5eec ppc/tetex-dvips-3.0-9.FC4.ppc.rpm 59b640dee6af739cde5d2f7f8dbebaaabcb4ec28 ppc/tetex-afm-3.0-9.FC4.ppc.rpm 0e4a4804df1cfd756da3be2b93bbdc08548ce3cf ppc/tetex-fonts-3.0-9.FC4.ppc.rpm 846dc3c32e28fc4b1bc703d62f6bf1f1daa26031 ppc/tetex-doc-3.0-9.FC4.ppc.rpm 4d054f78d197154f5de87f7118de6a01dd65230e ppc/debug/tetex-debuginfo-3.0-9.FC4.ppc.rpm aa56a1fce1d8d1b5213a588612bfbea03d2e18d8 x86_64/tetex-3.0-9.FC4.x86_64.rpm ccd10c08e3342efd7e0345e3d6bf030574066262 x86_64/tetex-latex-3.0-9.FC4.x86_64.rpm 2abd94209f969ffad4e152d5fa84d9724495886c x86_64/tetex-xdvi-3.0-9.FC4.x86_64.rpm 4a966b11d187f743445bf0a9193eab5e021bcc7b x86_64/tetex-dvips-3.0-9.FC4.x86_64.rpm 9b0b54e67982188e20dcbafdd1c25cc559306345 x86_64/tetex-afm-3.0-9.FC4.x86_64.rpm 81c804112f3f557950f618a4d7d459f6d3683298 x86_64/tetex-fonts-3.0-9.FC4.x86_64.rpm a3905125347b27476119eb2109f533f868898f00 x86_64/tetex-doc-3.0-9.FC4.x86_64.rpm 8c50c8246b1cd2eb16dc03f9f45ebbcb31470c87 x86_64/debug/tetex-debuginfo-3.0-9.FC4.x86_64.rpm 7afe7adda01e3a4cef49c7ff05975c1a2ebf4d8a i386/tetex-3.0-9.FC4.i386.rpm de7db2f913951772d3ea106472bc390b3bd6a391 i386/tetex-latex-3.0-9.FC4.i386.rpm af8d0c5026e4fbd557cc06024af2952025c8ba5b i386/tetex-xdvi-3.0-9.FC4.i386.rpm 3d7837c759ec17ac25a3ba82cc038eb0eab25558 i386/tetex-dvips-3.0-9.FC4.i386.rpm cb11ce07500fe9f978f8d372358eb4dd664bd03a i386/tetex-afm-3.0-9.FC4.i386.rpm c483b2892a7b02e22ac96c91e39e24f0fb783a26 i386/tetex-fonts-3.0-9.FC4.i386.rpm 31592fdca8509bc0412293b707eaf02485640b8e i386/tetex-doc-3.0-9.FC4.i386.rpm d706dba1b43706096b7dcd29c8ef203d72c48731 i386/debug/tetex-debuginfo-3.0-9.FC4.i386.rpm OTHER REFERENCES: SA17916: http://secunia.com/advisories/17916/ SA18329: http://secunia.com/advisories/18329/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------