---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Fedora update for tetex SECUNIA ADVISORY ID: SA27718 VERIFY ADVISORY: http://secunia.com/advisories/27718/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of sensitive information, DoS, System access WHERE: >From remote REVISION: 2.0 originally posted 2007-11-21 OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system. For more information: SA26293 SA27672 SOLUTION: Apply updated packages. -- Fedora Core 6 -- add5e237e0760ffbb35cba67af08415b0b53ae47 SRPMS/tetex-3.0-36.fc6.src.rpm add5e237e0760ffbb35cba67af08415b0b53ae47 noarch/tetex-3.0-36.fc6.src.rpm 6563dc6fb1d4bc8ddfe3ed8d976495551a1f84c9 ppc/tetex-dvips-3.0-36.fc6.ppc.rpm ff9a24ac0580ee04c1dd4b1da953272dec4568d0 ppc/tetex-doc-3.0-36.fc6.ppc.rpm ba0bd3d17a692260830058c85294f1099e8333b6 ppc/debug/tetex-debuginfo-3.0-36.fc6.ppc.rpm dfee8bb0576c7e7cff0bbc54a3c6cd59fff87987 ppc/tetex-xdvi-3.0-36.fc6.ppc.rpm db6fc5dd875ff55012106ec439abe20be620868b ppc/tetex-afm-3.0-36.fc6.ppc.rpm 2b79bf9dccfab035db29e73f9fc54710095c966c ppc/tetex-latex-3.0-36.fc6.ppc.rpm 83e37c88a1de48afed825914e8ac610a8c97bcc3 ppc/tetex-3.0-36.fc6.ppc.rpm e6e9731c0f2df3d43d7be2a8f2760560d7057db5 ppc/tetex-fonts-3.0-36.fc6.ppc.rpm 6bc20f047dd71248b239daec7bce57166a3caa82 x86_64/tetex-doc-3.0-36.fc6.x86_64.rpm a79f0236c530eb163b69c68497e7a06c81040f93 x86_64/tetex-dvips-3.0-36.fc6.x86_64.rpm 7b2649135938299038383eaedb0109be46db2aaa x86_64/tetex-afm-3.0-36.fc6.x86_64.rpm 1288892a74b6a68647282f5e8c97653c02d639cc x86_64/tetex-fonts-3.0-36.fc6.x86_64.rpm 4d76b39bd2f7c341bfe62640837f7fb42d5e7191 x86_64/tetex-xdvi-3.0-36.fc6.x86_64.rpm 410768ad413ee4ffea4072fc8106666b2a56e29d x86_64/tetex-latex-3.0-36.fc6.x86_64.rpm 9bedad0d54a276183c1c403675d6a3f5f824957c x86_64/tetex-3.0-36.fc6.x86_64.rpm 5f8f4dfb3eb76b6e9ecd55e23878087ee6adbebd x86_64/debug/tetex-debuginfo-3.0-36.fc6.x86_64.rpm df9cf84f3d6dba75ad7ebd77b587b7266d3ad893 i386/tetex-dvips-3.0-36.fc6.i386.rpm da1363e3d7a3990b5a4351f431a595a533d16bdd i386/tetex-3.0-36.fc6.i386.rpm 1f81d522927c1080f570b3f0e13bb00d3b0737d9 i386/tetex-xdvi-3.0-36.fc6.i386.rpm 294b5788f687871f0480195075052112dabe9ab3 i386/debug/tetex-debuginfo-3.0-36.fc6.i386.rpm a205df3c2d823c41614d66ee48412cf2bee8a8cc i386/tetex-latex-3.0-36.fc6.i386.rpm 4dec2372801b49a20fe0eee61ab48b1797326fb8 i386/tetex-fonts-3.0-36.fc6.i386.rpm 02ce647fb2a3b4a34018ba0476a06e24f1b05ac2 i386/tetex-doc-3.0-36.fc6.i386.rpm 2fbcbf1123199b9146d528e6b1456e5d4ae40eb8 i386/tetex-afm-3.0-36.fc6.i386.rpm -- Fedora 7 -- 92ec51994b53edc8e5bec1d6e24f37dfd15b824a tetex-fonts-3.0-40.3.fc7.ppc64.rpm 14b9f243e57555a73b5ca9abab28eaec30e3611a tetex-debuginfo-3.0-40.3.fc7.ppc64.rpm 54f30190c56cf01590df10751fc967f3bd54bb8e tetex-dvips-3.0-40.3.fc7.ppc64.rpm 076f7676a21881db34266f12f4435f726bced44c tetex-doc-3.0-40.3.fc7.ppc64.rpm c12626a843afa0401c58cae6c5079e4d7cda4281 tetex-3.0-40.3.fc7.ppc64.rpm c66519d7c2552597860591181a2a63e135b00e2b tetex-xdvi-3.0-40.3.fc7.ppc64.rpm cb5deb9cb217e5728994686b4c1884a221361db7 tetex-afm-3.0-40.3.fc7.ppc64.rpm 7a2cbdf5f15ba8bc2150b4c773bf246c191d7c8e tetex-latex-3.0-40.3.fc7.ppc64.rpm 8b3b50f4f1135c553f10b0638a2f2ae77361914f tetex-3.0-40.3.fc7.i386.rpm bd136a00615670707d34409e9a6d72ea6846703e tetex-dvips-3.0-40.3.fc7.i386.rpm 49a9f95b46e9e11fc05a4efd0aa7136a498747b6 tetex-debuginfo-3.0-40.3.fc7.i386.rpm c67e2d8c4f82bdc809a8add30fb437a74ad44ffb tetex-afm-3.0-40.3.fc7.i386.rpm f019fbb16ebab2f4517ec55cb7ecbdc0eaaa2a56 tetex-xdvi-3.0-40.3.fc7.i386.rpm dfad534b486ab736e19d9a1afd0b26a6866c7c05 tetex-fonts-3.0-40.3.fc7.i386.rpm 5620efb92ac5a5ae50904880c5f28b23cf9ecc10 tetex-doc-3.0-40.3.fc7.i386.rpm 84c1e84607bd609c911771f1979c2bdd1f7568be tetex-latex-3.0-40.3.fc7.i386.rpm 91ef6ab89a22364c8b31b3eac83a2d2a555ff798 tetex-dvips-3.0-40.3.fc7.x86_64.rpm 00ce83c8ca1e06828d8a32a1a20b244bb5aa250d tetex-xdvi-3.0-40.3.fc7.x86_64.rpm 0e32b9c0aae7be8112af55b0f1e24161c296a8d4 tetex-fonts-3.0-40.3.fc7.x86_64.rpm c829c46f9a01f5a8601a814bfd029b7af55c837e tetex-3.0-40.3.fc7.x86_64.rpm f32a8c23bcdeb7f35830dc63cf71a2167fadbc30 tetex-latex-3.0-40.3.fc7.x86_64.rpm aa0e659c4b21b66142cbfc542172963ea76c0159 tetex-doc-3.0-40.3.fc7.x86_64.rpm c7cd648093222dd693fbac0ac6eb52aca4337d35 tetex-debuginfo-3.0-40.3.fc7.x86_64.rpm 5ccbc52e7cf2c2cce429691311f67a6b68f9c94b tetex-afm-3.0-40.3.fc7.x86_64.rpm 02b0cdb15b2d9ebd1b9b6bafd5f82e18c2f5a839 tetex-3.0-40.3.fc7.ppc.rpm e1807d74496afe75eb19cc3ee9ab8734de365579 tetex-afm-3.0-40.3.fc7.ppc.rpm c57d07cc485d885ecd0b8d17021649ee986e5bff tetex-fonts-3.0-40.3.fc7.ppc.rpm ad988ab99aa5e0a4e4fa5f82ee4d4433f27c6a3c tetex-debuginfo-3.0-40.3.fc7.ppc.rpm ce452fc6f30dd9ebddf6692310e3f953c83d5fff tetex-dvips-3.0-40.3.fc7.ppc.rpm 36567cee8c863dffbb2f23dce6c0a8def2bba2c8 tetex-latex-3.0-40.3.fc7.ppc.rpm 188517c735b51e2b97bd344941e391c804d1ef18 tetex-doc-3.0-40.3.fc7.ppc.rpm 9e187f8cf6ee5f1a365ab324ca805321aa3bd9e5 tetex-xdvi-3.0-40.3.fc7.ppc.rpm 5c9ea1ce583d691151bb2317af36b0f6ef7c6197 tetex-3.0-40.3.fc7.src.rpm CHANGELOG: 2007-11-22: Added "Fedora Core 6" to the list of affected products. Added additional CVE references. ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html OTHER REFERENCES: SA26293: http://secunia.com/advisories/26293/ SA27672: http://secunia.com/advisories/27672/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------