Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2005:026 - Security Advisory
Issued:
2005-03-16
Updated:
2005-03-16

RHSA-2005:026 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

tetex security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated tetex packages that resolve security issues are now available for Red
Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

Description

The tetex packages (teTeX) contain an implementation of TeX for Linux or
UNIX systems.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which
also affects teTeX due to a shared codebase. An attacker could construct a
carefully crafted PDF file that could cause teTeX to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects teTeX due to a shared codebase. An attacker could
construct a carefully crafted PDF file that could cause teTeX to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to
this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 144257 - CAN-2004-1125 xpdf buffer overflow
  • BZ - 145055 - CAN-2005-0064 xpdf buffer overflow

CVEs

  • CVE-2004-1125
  • CVE-2005-0064

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
tetex-2.0.2-22.EL4.4.src.rpm SHA-256: 168084e9979c7d125ef7aad0f24ffc9bdc4c3afb5e7dc2846a50a5e062c1631a
x86_64
tetex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 479603a909711c61ae1c0ba6aae2e76fb650e50607ec4e92615a9866f5df4c60
tetex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 479603a909711c61ae1c0ba6aae2e76fb650e50607ec4e92615a9866f5df4c60
tetex-afm-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 2a6c5dc85ac68b934c2f299158be6279336e85bd67592d56e9e1d1c4da20aabb
tetex-afm-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 2a6c5dc85ac68b934c2f299158be6279336e85bd67592d56e9e1d1c4da20aabb
tetex-doc-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 01ef01d1a51b83aaae5063c6ed2d11c172567ef2ddee40655ec704e7c1be34b7
tetex-doc-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 01ef01d1a51b83aaae5063c6ed2d11c172567ef2ddee40655ec704e7c1be34b7
tetex-dvips-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 8123663596eefb8828b145cf8c8f3bedac3509580fa5222d84cab95138e16cca
tetex-dvips-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 8123663596eefb8828b145cf8c8f3bedac3509580fa5222d84cab95138e16cca
tetex-fonts-2.0.2-22.EL4.4.x86_64.rpm SHA-256: d13d9e77dedab6b65a35eb63052e6bf09ee4d4c9c85186d84ea4fa1de4d117f7
tetex-fonts-2.0.2-22.EL4.4.x86_64.rpm SHA-256: d13d9e77dedab6b65a35eb63052e6bf09ee4d4c9c85186d84ea4fa1de4d117f7
tetex-latex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 101a4ada4ddee3b8bcbd985240be07f43c14b61aab5d2ab76ffa913893fde162
tetex-latex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 101a4ada4ddee3b8bcbd985240be07f43c14b61aab5d2ab76ffa913893fde162
tetex-xdvi-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 7f4d35f767b5173420c6746b2da0a07113e705ed628820894ab7ba639f987acd
tetex-xdvi-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 7f4d35f767b5173420c6746b2da0a07113e705ed628820894ab7ba639f987acd
ia64
tetex-2.0.2-22.EL4.4.ia64.rpm SHA-256: c5bb803fcda26c76ebcf1b2b68c227ad5df1c2e817c5fdcc0f201696217e390a
tetex-2.0.2-22.EL4.4.ia64.rpm SHA-256: c5bb803fcda26c76ebcf1b2b68c227ad5df1c2e817c5fdcc0f201696217e390a
tetex-afm-2.0.2-22.EL4.4.ia64.rpm SHA-256: 7793755a16ac8739040dd8f1ea317496e4982b278f631946fe4202f649d799d4
tetex-afm-2.0.2-22.EL4.4.ia64.rpm SHA-256: 7793755a16ac8739040dd8f1ea317496e4982b278f631946fe4202f649d799d4
tetex-doc-2.0.2-22.EL4.4.ia64.rpm SHA-256: a6903fe9e7596172136e17905312d48a00efd07ee3cc6b5a04e241de45b51ac2
tetex-doc-2.0.2-22.EL4.4.ia64.rpm SHA-256: a6903fe9e7596172136e17905312d48a00efd07ee3cc6b5a04e241de45b51ac2
tetex-dvips-2.0.2-22.EL4.4.ia64.rpm SHA-256: 033bdfc4ae58eabaa40b508894bb2b91b9cb03f5332bd1c6d54a3b5347d4c8af
tetex-dvips-2.0.2-22.EL4.4.ia64.rpm SHA-256: 033bdfc4ae58eabaa40b508894bb2b91b9cb03f5332bd1c6d54a3b5347d4c8af
tetex-fonts-2.0.2-22.EL4.4.ia64.rpm SHA-256: 3ced5d3e0d229a9467a2eec50880a78a5e228e37b7b939b9d44aab1bcc529c83
tetex-fonts-2.0.2-22.EL4.4.ia64.rpm SHA-256: 3ced5d3e0d229a9467a2eec50880a78a5e228e37b7b939b9d44aab1bcc529c83
tetex-latex-2.0.2-22.EL4.4.ia64.rpm SHA-256: f01bbde213bdbcfd95bea018ae25617e6cceee1cb17a33a94609528c9bb6034d
tetex-latex-2.0.2-22.EL4.4.ia64.rpm SHA-256: f01bbde213bdbcfd95bea018ae25617e6cceee1cb17a33a94609528c9bb6034d
tetex-xdvi-2.0.2-22.EL4.4.ia64.rpm SHA-256: d35e6802af0a057a63af26e6703854120f17fccda09ebf8de650d4b1593a8566
tetex-xdvi-2.0.2-22.EL4.4.ia64.rpm SHA-256: d35e6802af0a057a63af26e6703854120f17fccda09ebf8de650d4b1593a8566
i386
tetex-2.0.2-22.EL4.4.i386.rpm SHA-256: 120de85538585af0a2ef2dffe56c378d1c4b856d7f8fec26298403188f059713
tetex-2.0.2-22.EL4.4.i386.rpm SHA-256: 120de85538585af0a2ef2dffe56c378d1c4b856d7f8fec26298403188f059713
tetex-afm-2.0.2-22.EL4.4.i386.rpm SHA-256: c3bf846163b553a878f4cd961daf2c3ee75e16f439ef64f9012dbadc82e2fb08
tetex-afm-2.0.2-22.EL4.4.i386.rpm SHA-256: c3bf846163b553a878f4cd961daf2c3ee75e16f439ef64f9012dbadc82e2fb08
tetex-doc-2.0.2-22.EL4.4.i386.rpm SHA-256: b12e5115a4d9316d318659dea8284e7e7bc543ab522bb390e16917771bead659
tetex-doc-2.0.2-22.EL4.4.i386.rpm SHA-256: b12e5115a4d9316d318659dea8284e7e7bc543ab522bb390e16917771bead659
tetex-dvips-2.0.2-22.EL4.4.i386.rpm SHA-256: e95d59e65a0ede86fc554f756b21642e49adbb5214f758b3c7a5e74654a9f933
tetex-dvips-2.0.2-22.EL4.4.i386.rpm SHA-256: e95d59e65a0ede86fc554f756b21642e49adbb5214f758b3c7a5e74654a9f933
tetex-fonts-2.0.2-22.EL4.4.i386.rpm SHA-256: 9c894407bd719c81f492ef28d9122862d7477215f9deed8b011a18cedb9ce3cb
tetex-fonts-2.0.2-22.EL4.4.i386.rpm SHA-256: 9c894407bd719c81f492ef28d9122862d7477215f9deed8b011a18cedb9ce3cb
tetex-latex-2.0.2-22.EL4.4.i386.rpm SHA-256: db1bf12ed16e63be5039082c386825f5ea33ffe24398d28862b948df32ae5b40
tetex-latex-2.0.2-22.EL4.4.i386.rpm SHA-256: db1bf12ed16e63be5039082c386825f5ea33ffe24398d28862b948df32ae5b40
tetex-xdvi-2.0.2-22.EL4.4.i386.rpm SHA-256: 4d2ffda052a7d5666a7a212baa2f6df9e83940860a801a5e17fdb6524aedca92
tetex-xdvi-2.0.2-22.EL4.4.i386.rpm SHA-256: 4d2ffda052a7d5666a7a212baa2f6df9e83940860a801a5e17fdb6524aedca92

Red Hat Enterprise Linux Workstation 4

SRPM
tetex-2.0.2-22.EL4.4.src.rpm SHA-256: 168084e9979c7d125ef7aad0f24ffc9bdc4c3afb5e7dc2846a50a5e062c1631a
x86_64
tetex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 479603a909711c61ae1c0ba6aae2e76fb650e50607ec4e92615a9866f5df4c60
tetex-afm-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 2a6c5dc85ac68b934c2f299158be6279336e85bd67592d56e9e1d1c4da20aabb
tetex-doc-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 01ef01d1a51b83aaae5063c6ed2d11c172567ef2ddee40655ec704e7c1be34b7
tetex-dvips-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 8123663596eefb8828b145cf8c8f3bedac3509580fa5222d84cab95138e16cca
tetex-fonts-2.0.2-22.EL4.4.x86_64.rpm SHA-256: d13d9e77dedab6b65a35eb63052e6bf09ee4d4c9c85186d84ea4fa1de4d117f7
tetex-latex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 101a4ada4ddee3b8bcbd985240be07f43c14b61aab5d2ab76ffa913893fde162
tetex-xdvi-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 7f4d35f767b5173420c6746b2da0a07113e705ed628820894ab7ba639f987acd
ia64
tetex-2.0.2-22.EL4.4.ia64.rpm SHA-256: c5bb803fcda26c76ebcf1b2b68c227ad5df1c2e817c5fdcc0f201696217e390a
tetex-afm-2.0.2-22.EL4.4.ia64.rpm SHA-256: 7793755a16ac8739040dd8f1ea317496e4982b278f631946fe4202f649d799d4
tetex-doc-2.0.2-22.EL4.4.ia64.rpm SHA-256: a6903fe9e7596172136e17905312d48a00efd07ee3cc6b5a04e241de45b51ac2
tetex-dvips-2.0.2-22.EL4.4.ia64.rpm SHA-256: 033bdfc4ae58eabaa40b508894bb2b91b9cb03f5332bd1c6d54a3b5347d4c8af
tetex-fonts-2.0.2-22.EL4.4.ia64.rpm SHA-256: 3ced5d3e0d229a9467a2eec50880a78a5e228e37b7b939b9d44aab1bcc529c83
tetex-latex-2.0.2-22.EL4.4.ia64.rpm SHA-256: f01bbde213bdbcfd95bea018ae25617e6cceee1cb17a33a94609528c9bb6034d
tetex-xdvi-2.0.2-22.EL4.4.ia64.rpm SHA-256: d35e6802af0a057a63af26e6703854120f17fccda09ebf8de650d4b1593a8566
i386
tetex-2.0.2-22.EL4.4.i386.rpm SHA-256: 120de85538585af0a2ef2dffe56c378d1c4b856d7f8fec26298403188f059713
tetex-afm-2.0.2-22.EL4.4.i386.rpm SHA-256: c3bf846163b553a878f4cd961daf2c3ee75e16f439ef64f9012dbadc82e2fb08
tetex-doc-2.0.2-22.EL4.4.i386.rpm SHA-256: b12e5115a4d9316d318659dea8284e7e7bc543ab522bb390e16917771bead659
tetex-dvips-2.0.2-22.EL4.4.i386.rpm SHA-256: e95d59e65a0ede86fc554f756b21642e49adbb5214f758b3c7a5e74654a9f933
tetex-fonts-2.0.2-22.EL4.4.i386.rpm SHA-256: 9c894407bd719c81f492ef28d9122862d7477215f9deed8b011a18cedb9ce3cb
tetex-latex-2.0.2-22.EL4.4.i386.rpm SHA-256: db1bf12ed16e63be5039082c386825f5ea33ffe24398d28862b948df32ae5b40
tetex-xdvi-2.0.2-22.EL4.4.i386.rpm SHA-256: 4d2ffda052a7d5666a7a212baa2f6df9e83940860a801a5e17fdb6524aedca92

Red Hat Enterprise Linux Desktop 4

SRPM
tetex-2.0.2-22.EL4.4.src.rpm SHA-256: 168084e9979c7d125ef7aad0f24ffc9bdc4c3afb5e7dc2846a50a5e062c1631a
x86_64
tetex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 479603a909711c61ae1c0ba6aae2e76fb650e50607ec4e92615a9866f5df4c60
tetex-afm-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 2a6c5dc85ac68b934c2f299158be6279336e85bd67592d56e9e1d1c4da20aabb
tetex-doc-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 01ef01d1a51b83aaae5063c6ed2d11c172567ef2ddee40655ec704e7c1be34b7
tetex-dvips-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 8123663596eefb8828b145cf8c8f3bedac3509580fa5222d84cab95138e16cca
tetex-fonts-2.0.2-22.EL4.4.x86_64.rpm SHA-256: d13d9e77dedab6b65a35eb63052e6bf09ee4d4c9c85186d84ea4fa1de4d117f7
tetex-latex-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 101a4ada4ddee3b8bcbd985240be07f43c14b61aab5d2ab76ffa913893fde162
tetex-xdvi-2.0.2-22.EL4.4.x86_64.rpm SHA-256: 7f4d35f767b5173420c6746b2da0a07113e705ed628820894ab7ba639f987acd
i386
tetex-2.0.2-22.EL4.4.i386.rpm SHA-256: 120de85538585af0a2ef2dffe56c378d1c4b856d7f8fec26298403188f059713
tetex-afm-2.0.2-22.EL4.4.i386.rpm SHA-256: c3bf846163b553a878f4cd961daf2c3ee75e16f439ef64f9012dbadc82e2fb08
tetex-doc-2.0.2-22.EL4.4.i386.rpm SHA-256: b12e5115a4d9316d318659dea8284e7e7bc543ab522bb390e16917771bead659
tetex-dvips-2.0.2-22.EL4.4.i386.rpm SHA-256: e95d59e65a0ede86fc554f756b21642e49adbb5214f758b3c7a5e74654a9f933
tetex-fonts-2.0.2-22.EL4.4.i386.rpm SHA-256: 9c894407bd719c81f492ef28d9122862d7477215f9deed8b011a18cedb9ce3cb
tetex-latex-2.0.2-22.EL4.4.i386.rpm SHA-256: db1bf12ed16e63be5039082c386825f5ea33ffe24398d28862b948df32ae5b40
tetex-xdvi-2.0.2-22.EL4.4.i386.rpm SHA-256: 4d2ffda052a7d5666a7a212baa2f6df9e83940860a801a5e17fdb6524aedca92

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
tetex-2.0.2-22.EL4.4.src.rpm SHA-256: 168084e9979c7d125ef7aad0f24ffc9bdc4c3afb5e7dc2846a50a5e062c1631a
s390x
tetex-2.0.2-22.EL4.4.s390x.rpm SHA-256: 89f0f7a7787fc6bb2b69cfb6b60b6607375352b724eecdb61c3dd16cede03abe
tetex-afm-2.0.2-22.EL4.4.s390x.rpm SHA-256: 3e8e453aaa1f3c1f0020f22fe37164cf461bf42cad73182ad113c2da2c92aa5d
tetex-doc-2.0.2-22.EL4.4.s390x.rpm SHA-256: 8a5bc17f29e25be3b944d91e9008e50de8cf89907269c9afac688822a1121f30
tetex-dvips-2.0.2-22.EL4.4.s390x.rpm SHA-256: ad7daadfec4614d238bc05794503928e7e598c7284e8291272a7604ad5a6dfea
tetex-fonts-2.0.2-22.EL4.4.s390x.rpm SHA-256: 227860d4335fb52af6dc723a9d17fc184aa66c8c85d2a34ae9b4c06909fecb45
tetex-latex-2.0.2-22.EL4.4.s390x.rpm SHA-256: 05bf8c36227562d3de902e4a3fdd4a896b781dfce41e8a6bc72f3e5548cda848
tetex-xdvi-2.0.2-22.EL4.4.s390x.rpm SHA-256: 5d10d7b9286c5037b4313c1903c25b7ae7fe4ab6146857991d08120e48c30884
s390
tetex-2.0.2-22.EL4.4.s390.rpm SHA-256: eb7adb9348d8e85f7b3d80caad01d7590262d4962ad0dbd6157e5aee1c1d3b43
tetex-afm-2.0.2-22.EL4.4.s390.rpm SHA-256: 9367727f194f64c69b211ebb8e49df4245d0e04f3a882b70732d9eee29faf939
tetex-doc-2.0.2-22.EL4.4.s390.rpm SHA-256: 4c5dfa4ddbdde4ab09a11264b76e44f554e2d249e2ec1f3a015b554aa1d24f85
tetex-dvips-2.0.2-22.EL4.4.s390.rpm SHA-256: 5bfed47d42d99f958b0348533d34f730c03e98786ecf5732d70d3b800dab160a
tetex-fonts-2.0.2-22.EL4.4.s390.rpm SHA-256: b057b9b90d77d8c016ceb8f6e959181b04c61b133a4a4760c9be58cec9f0e68c
tetex-latex-2.0.2-22.EL4.4.s390.rpm SHA-256: c53d180996bcc79ff1d79a59ec793c0fa59f5792c1a5ec7e881d508f62e9f138
tetex-xdvi-2.0.2-22.EL4.4.s390.rpm SHA-256: fa182aa6a83d623452aef90fd3cb6d20ebde747fd0996288b48632a5bb6dd560

Red Hat Enterprise Linux for Power, big endian 4

SRPM
tetex-2.0.2-22.EL4.4.src.rpm SHA-256: 168084e9979c7d125ef7aad0f24ffc9bdc4c3afb5e7dc2846a50a5e062c1631a
ppc
tetex-2.0.2-22.EL4.4.ppc.rpm SHA-256: 2280b16887f0e864c678a47b131f1f8eb7d9120c739c57c83d696d3e9744d0a8
tetex-afm-2.0.2-22.EL4.4.ppc.rpm SHA-256: 31ba9fa09af01c543d36a7348438339b0be2bc75d94f7325f22075cbb102d2fe
tetex-doc-2.0.2-22.EL4.4.ppc.rpm SHA-256: 377601f163ae75756990a4b391203fda764ae6dbc8572fdaab9494b77631ce46
tetex-dvips-2.0.2-22.EL4.4.ppc.rpm SHA-256: bccb22eb84ffe9c9709d71c2ed8f34402399e3357c9a8f940c4b6f1edf4c6b57
tetex-fonts-2.0.2-22.EL4.4.ppc.rpm SHA-256: 839f02d44d8f30547e9c44cffc39c3fdb4f56efcef561e9f025ab4e8f25d751e
tetex-latex-2.0.2-22.EL4.4.ppc.rpm SHA-256: d58212af057353644cd325c40b641b7583a35a8026b2277a67cff287c28715a5
tetex-xdvi-2.0.2-22.EL4.4.ppc.rpm SHA-256: 7d085c3afc3983b5108f54b9937e0fbab2daa705276689d744cd14e15c0f6dad

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility