Secunia Security Advisory - Mandriva has issued an update for tetex. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a vulnerable system.
938b3b1613efc6b3747a1aa738585ebbe2704835cddfe9071cbf1f546e05578a
----------------------------------------------------------------------
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
----------------------------------------------------------------------
TITLE:
Mandriva update for tetex
SECUNIA ADVISORY ID:
SA20866
VERIFY ADVISORY:
http://secunia.com/advisories/20866/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Mandriva Linux 2006
http://secunia.com/product/9020/
DESCRIPTION:
Mandriva has issued an update for tetex. This fixes some
vulnerabilities, which potentially can be exploited by malicious
people to cause a DoS (Denial of Service) and to compromise a
vulnerable system.
For more information:
SA13179
SA20500
SOLUTION:
Apply updated packages.
-- Mandrivalinux 2006 --
c0cc16cb92ca140fa0cd77ab3082334c
2006.0/RPMS/jadetex-3.12-110.2.20060mdk.i586.rpm
2a599e06878cfd913ee2460352d18833
2006.0/RPMS/tetex-3.0-12.2.20060mdk.i586.rpm
80577accadf3ccede359d1c305e3cb62
2006.0/RPMS/tetex-afm-3.0-12.2.20060mdk.i586.rpm
b1e27b6283a17194ef4feead5033b939
2006.0/RPMS/tetex-context-3.0-12.2.20060mdk.i586.rpm
e735ccd87def0f4a8bf1262aa3d92ca6
2006.0/RPMS/tetex-devel-3.0-12.2.20060mdk.i586.rpm
dbd71f3daf27a1bafba42eb0051f2fab
2006.0/RPMS/tetex-doc-3.0-12.2.20060mdk.i586.rpm
eea80943eaef26d2d0d40d4ef7e183aa
2006.0/RPMS/tetex-dvilj-3.0-12.2.20060mdk.i586.rpm
05ce22c18eb82c10a6306cbe8d2446fa
2006.0/RPMS/tetex-dvipdfm-3.0-12.2.20060mdk.i586.rpm
0d1270c9b9f940d3206aaa1be682b1cf
2006.0/RPMS/tetex-dvips-3.0-12.2.20060mdk.i586.rpm
962a78f23d0607544ffa35045b7af955
2006.0/RPMS/tetex-latex-3.0-12.2.20060mdk.i586.rpm
4e823ca61b25f0285c75dc1886947e73
2006.0/RPMS/tetex-mfwin-3.0-12.2.20060mdk.i586.rpm
44df21439b36aa5e9b60055b4f77936d
2006.0/RPMS/tetex-texi2html-3.0-12.2.20060mdk.i586.rpm
8eab912c43ee68f35cdd1f9480d5951c
2006.0/RPMS/tetex-xdvi-3.0-12.2.20060mdk.i586.rpm
6d8ba515e52f4abfd54dd306174462c7
2006.0/RPMS/xmltex-1.9-58.2.20060mdk.i586.rpm
81d035449228282e7a72419f4b260e7a
2006.0/SRPMS/tetex-3.0-12.2.20060mdk.src.rpm
-- Mandrivalinux 2006/X86_64 --
0466f60289f9ce688130e6d0a508e8bc
x86_64/2006.0/RPMS/jadetex-3.12-110.2.20060mdk.x86_64.rpm
faf6465bf63a2f6719def5d3fb17ef17
x86_64/2006.0/RPMS/tetex-3.0-12.2.20060mdk.x86_64.rpm
32f99226647319d5347d19077788bd5b
x86_64/2006.0/RPMS/tetex-afm-3.0-12.2.20060mdk.x86_64.rpm
1d1aaee40dad532423173ccea3849e75
x86_64/2006.0/RPMS/tetex-context-3.0-12.2.20060mdk.x86_64.rpm
10d68d89752022e5bdf74ff0b07f1884
x86_64/2006.0/RPMS/tetex-devel-3.0-12.2.20060mdk.x86_64.rpm
309c4b8d26fd7b6531b9ab183256191c
x86_64/2006.0/RPMS/tetex-doc-3.0-12.2.20060mdk.x86_64.rpm
1afd5620adaad5e7a43a5f5b08aec37d
x86_64/2006.0/RPMS/tetex-dvilj-3.0-12.2.20060mdk.x86_64.rpm
db2d9cc973c213cc3abe78bdf919c4bc
x86_64/2006.0/RPMS/tetex-dvipdfm-3.0-12.2.20060mdk.x86_64.rpm
e1dffcb652dc8d246d0da1ec6620bd05
x86_64/2006.0/RPMS/tetex-dvips-3.0-12.2.20060mdk.x86_64.rpm
e792f17a436aae19883b979f32c08a33
x86_64/2006.0/RPMS/tetex-latex-3.0-12.2.20060mdk.x86_64.rpm
b992bf51cb291e396a4a7f5d75bd2e84
x86_64/2006.0/RPMS/tetex-mfwin-3.0-12.2.20060mdk.x86_64.rpm
eade7aa0e9665969c8d73bb7909da672
x86_64/2006.0/RPMS/tetex-texi2html-3.0-12.2.20060mdk.x86_64.rpm
f1e9462e7213c74bcc59c27242b8d03b
x86_64/2006.0/RPMS/tetex-xdvi-3.0-12.2.20060mdk.x86_64.rpm
4d1ade13bb2ffed71cb2f6d45165a672
x86_64/2006.0/RPMS/xmltex-1.9-58.2.20060mdk.x86_64.rpm
81d035449228282e7a72419f4b260e7a
x86_64/2006.0/SRPMS/tetex-3.0-12.2.20060mdk.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
OTHER REFERENCES:
SA13179:
http://secunia.com/advisories/13179/
SA20500:
http://secunia.com/advisories/20500/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------