Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0399 - Security Advisory
Issued:
2010-05-06
Updated:
2010-05-06

RHSA-2010:0399 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: tetex security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated tetex packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

teTeX is an implementation of TeX. TeX takes a text file and a set of
formatting commands as input, and creates a typesetter-independent DeVice
Independent (DVI) file as output.

A buffer overflow flaw was found in the way teTeX processed virtual font
files when converting DVI files into PostScript. An attacker could create a
malicious DVI file that would cause the dvips executable to crash or,
potentially, execute arbitrary code. (CVE-2010-0827)

Multiple integer overflow flaws were found in the way teTeX processed
special commands when converting DVI files into PostScript. An attacker
could create a malicious DVI file that would cause the dvips executable to
crash or, potentially, execute arbitrary code. (CVE-2010-0739,
CVE-2010-1440)

A stack-based buffer overflow flaw was found in the way teTeX processed DVI
files containing HyperTeX references with long titles, when converting them
into PostScript. An attacker could create a malicious DVI file that would
cause the dvips executable to crash. (CVE-2007-5935)

teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)
file viewer, to allow adding images in PDF format to the generated PDF
documents. The following issues affect Xpdf code:

Multiple integer overflow flaws were found in Xpdf's JBIG2 decoder. If a
local user generated a PDF file from a TeX document, referencing a
specially-crafted PDF file, it would cause Xpdf to crash or, potentially,
execute arbitrary code with the privileges of the user running pdflatex.
(CVE-2009-0147, CVE-2009-1179)

Multiple integer overflow flaws were found in Xpdf. If a local user
generated a PDF file from a TeX document, referencing a specially-crafted
PDF file, it would cause Xpdf to crash or, potentially, execute arbitrary
code with the privileges of the user running pdflatex. (CVE-2009-0791,
CVE-2009-3609)

A heap-based buffer overflow flaw was found in Xpdf's JBIG2 decoder. If a
local user generated a PDF file from a TeX document, referencing a
specially-crafted PDF file, it would cause Xpdf to crash or, potentially,
execute arbitrary code with the privileges of the user running pdflatex.
(CVE-2009-0195)

Multiple buffer overflow flaws were found in Xpdf's JBIG2 decoder. If a
local user generated a PDF file from a TeX document, referencing a
specially-crafted PDF file, it would cause Xpdf to crash or, potentially,
execute arbitrary code with the privileges of the user running pdflatex.
(CVE-2009-0146, CVE-2009-1182)

Multiple flaws were found in Xpdf's JBIG2 decoder that could lead to the
freeing of arbitrary memory. If a local user generated a PDF file from a
TeX document, referencing a specially-crafted PDF file, it would cause
Xpdf to crash or, potentially, execute arbitrary code with the privileges
of the user running pdflatex. (CVE-2009-0166, CVE-2009-1180)

Multiple input validation flaws were found in Xpdf's JBIG2 decoder. If a
local user generated a PDF file from a TeX document, referencing a
specially-crafted PDF file, it would cause Xpdf to crash or, potentially,
execute arbitrary code with the privileges of the user running pdflatex.
(CVE-2009-0800)

Multiple denial of service flaws were found in Xpdf's JBIG2 decoder. If a
local user generated a PDF file from a TeX document, referencing a
specially-crafted PDF file, it would cause Xpdf to crash. (CVE-2009-0799,
CVE-2009-1181, CVE-2009-1183)

Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product
Security team, Will Dormann of the CERT/CC, and Alin Rad Pop of Secunia
Research, for responsibly reporting the Xpdf flaws.

All users of tetex are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 368591 - CVE-2007-5935 dvips -z buffer overflow with long href
  • BZ - 490612 - CVE-2009-0146 xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195)
  • BZ - 490614 - CVE-2009-0147 xpdf: Multiple integer overflows in JBIG2 decoder
  • BZ - 490625 - CVE-2009-0166 xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder
  • BZ - 491840 - CVE-2009-0791 xpdf: multiple integer overflows
  • BZ - 495886 - CVE-2009-0799 PDF JBIG2 decoder OOB read
  • BZ - 495887 - CVE-2009-0800 PDF JBIG2 multiple input validation flaws
  • BZ - 495889 - CVE-2009-1179 PDF JBIG2 integer overflow
  • BZ - 495892 - CVE-2009-1180 PDF JBIG2 invalid free()
  • BZ - 495894 - CVE-2009-1181 PDF JBIG2 NULL dereference
  • BZ - 495896 - CVE-2009-1182 PDF JBIG2 MMR decoder buffer overflows
  • BZ - 495899 - CVE-2009-1183 PDF JBIG2 MMR infinite loop DoS
  • BZ - 526893 - CVE-2009-3609 xpdf/poppler: ImageStream::ImageStream integer overflow
  • BZ - 572914 - CVE-2010-0827 tetex, texlive: Buffer overflow flaw by processing virtual font files
  • BZ - 572941 - CVE-2010-0739 tetex, texlive: Integer overflow by processing special commands
  • BZ - 586819 - CVE-2010-1440 tetex, texlive: Integer overflow by processing special commands

CVEs

  • CVE-2009-0147
  • CVE-2009-0146
  • CVE-2009-0800
  • CVE-2009-0166
  • CVE-2009-1180
  • CVE-2009-1181
  • CVE-2009-1182
  • CVE-2009-1183
  • CVE-2009-1179
  • CVE-2009-0799
  • CVE-2009-0195
  • CVE-2009-0791
  • CVE-2009-3609
  • CVE-2010-0827
  • CVE-2010-0739
  • CVE-2010-1440
  • CVE-2007-5935

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
x86_64
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
ia64
tetex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bbdc690192b282563364fda81493230f97661032744b47085c56c96d94bc502f
tetex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bbdc690192b282563364fda81493230f97661032744b47085c56c96d94bc502f
tetex-afm-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 7757dc7bcc843197f377c6154dda76cf265dfd1e19b850e0968d5a44ba61acea
tetex-afm-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 7757dc7bcc843197f377c6154dda76cf265dfd1e19b850e0968d5a44ba61acea
tetex-doc-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bd52b8d13d85ca8986ded82f6ce59d4faceede2613a6db94a4d72cdb65b7715f
tetex-doc-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bd52b8d13d85ca8986ded82f6ce59d4faceede2613a6db94a4d72cdb65b7715f
tetex-dvips-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: ae7e250decde3391c719deafeb5f9e20d661c78d062616404a48aa07a67e8f26
tetex-dvips-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: ae7e250decde3391c719deafeb5f9e20d661c78d062616404a48aa07a67e8f26
tetex-fonts-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 82de94e36b4fc4e9d4e5cdf5f538e3a9a32f7906f8e8c65c447b8db4c8db1dde
tetex-fonts-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 82de94e36b4fc4e9d4e5cdf5f538e3a9a32f7906f8e8c65c447b8db4c8db1dde
tetex-latex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: e0a850fdb22e077d7b21dcb9647152ec0aff9434db9a528bbcd7e9fda81f0d80
tetex-latex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: e0a850fdb22e077d7b21dcb9647152ec0aff9434db9a528bbcd7e9fda81f0d80
tetex-xdvi-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 9032115a90c36e16da0e55ff3be868874c143a29f3d9f13bdb7022d4fa767a0d
tetex-xdvi-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 9032115a90c36e16da0e55ff3be868874c143a29f3d9f13bdb7022d4fa767a0d
i386
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
x86_64
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
ia64
tetex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bbdc690192b282563364fda81493230f97661032744b47085c56c96d94bc502f
tetex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bbdc690192b282563364fda81493230f97661032744b47085c56c96d94bc502f
tetex-afm-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 7757dc7bcc843197f377c6154dda76cf265dfd1e19b850e0968d5a44ba61acea
tetex-afm-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 7757dc7bcc843197f377c6154dda76cf265dfd1e19b850e0968d5a44ba61acea
tetex-doc-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bd52b8d13d85ca8986ded82f6ce59d4faceede2613a6db94a4d72cdb65b7715f
tetex-doc-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bd52b8d13d85ca8986ded82f6ce59d4faceede2613a6db94a4d72cdb65b7715f
tetex-dvips-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: ae7e250decde3391c719deafeb5f9e20d661c78d062616404a48aa07a67e8f26
tetex-dvips-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: ae7e250decde3391c719deafeb5f9e20d661c78d062616404a48aa07a67e8f26
tetex-fonts-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 82de94e36b4fc4e9d4e5cdf5f538e3a9a32f7906f8e8c65c447b8db4c8db1dde
tetex-fonts-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 82de94e36b4fc4e9d4e5cdf5f538e3a9a32f7906f8e8c65c447b8db4c8db1dde
tetex-latex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: e0a850fdb22e077d7b21dcb9647152ec0aff9434db9a528bbcd7e9fda81f0d80
tetex-latex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: e0a850fdb22e077d7b21dcb9647152ec0aff9434db9a528bbcd7e9fda81f0d80
tetex-xdvi-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 9032115a90c36e16da0e55ff3be868874c143a29f3d9f13bdb7022d4fa767a0d
tetex-xdvi-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 9032115a90c36e16da0e55ff3be868874c143a29f3d9f13bdb7022d4fa767a0d
i386
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c

Red Hat Enterprise Linux Workstation 4

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
x86_64
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
ia64
tetex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bbdc690192b282563364fda81493230f97661032744b47085c56c96d94bc502f
tetex-afm-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 7757dc7bcc843197f377c6154dda76cf265dfd1e19b850e0968d5a44ba61acea
tetex-doc-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: bd52b8d13d85ca8986ded82f6ce59d4faceede2613a6db94a4d72cdb65b7715f
tetex-dvips-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: ae7e250decde3391c719deafeb5f9e20d661c78d062616404a48aa07a67e8f26
tetex-fonts-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 82de94e36b4fc4e9d4e5cdf5f538e3a9a32f7906f8e8c65c447b8db4c8db1dde
tetex-latex-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: e0a850fdb22e077d7b21dcb9647152ec0aff9434db9a528bbcd7e9fda81f0d80
tetex-xdvi-2.0.2-22.0.1.EL4.16.ia64.rpm SHA-256: 9032115a90c36e16da0e55ff3be868874c143a29f3d9f13bdb7022d4fa767a0d
i386
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c

Red Hat Enterprise Linux Desktop 4

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
x86_64
tetex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 4e3b18a02b1c644fd5951f3ca89bda6fcb4e0d2eb00518eac5e2096ce0d5e893
tetex-afm-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f38573ef26486a3dd3e31f5219e8434e00588b15e8b70ab5271f2436d4c309cb
tetex-doc-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f475418c002516ee175e020e5d5c2e3ab2f606ea189cc06673cc1a729a73fe3b
tetex-dvips-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 2f7e37b283386420a6eaabd959facaef535927ec9cba3ce02260b01207dde271
tetex-fonts-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: 5281c52bc58240e1d767fe946c42d8ea08eef64c5b6fa035f2474938910f7f2e
tetex-latex-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: bb0e38c92ffb63f755261257a01ee1dbb5afe88ff9420fe1248b1935ea5eb1da
tetex-xdvi-2.0.2-22.0.1.EL4.16.x86_64.rpm SHA-256: f836cd950336a22e3aa6dccf985f822c96820d98e7def1ae085603c44a6ac353
i386
tetex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: f15065ef4892142821e5d1958ea9171f0de18dcbbd69e79c1486932f1b49f233
tetex-afm-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 6ea2ffb4a2bb57c9a3d75278c65ed0f57dd46838dd245ca6bf8918c3711430ef
tetex-doc-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 75430eaf0db4ad543861d74603257d2755a24066b2ccc7be82654e68f90a77e2
tetex-dvips-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 16780c9cdd6c4a10b2bedce49b6bbb4974af9d8586d3b1d148408ad4bf0a4ed5
tetex-fonts-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a772843bc4791913a2c3639f6a3027d7a2ec7030a2192884f6daed88417cf92d
tetex-latex-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: a8fc0f81f03cd55a79806fb03d83318b6a7a9e4faa9b1afeed6e17b3e1977e6d
tetex-xdvi-2.0.2-22.0.1.EL4.16.i386.rpm SHA-256: 569300660b817f74a56027b0934af8b093200dc63b891ad270b55a8ae50bf80c

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
s390x
tetex-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: bac79a9eafd5ab65d50c0b495904f12e35a28bc40fbf675ae1b6a684c1eefa86
tetex-afm-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 940089e7a5d1f91b5d742b0bfc0fa4c4baa6acf494e52c3a650dce91b94f32ac
tetex-doc-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: df20be8a13088dc61f3b43db8b471f5e17b15d3e585957288ec02d98d37d1328
tetex-dvips-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: a6b12b6b71669464d386bf19133108eb56bb91e39e8447c88f5488a06ff16d70
tetex-fonts-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: be3af1b1bdb548e3e04b5c2b56ed9995ddbb19042805777a6194c5d65167d58f
tetex-latex-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 21bdf34e135b5ad3f0a4dd25d05efabf1f0c3a174e2cdd87ca46a21cafcc9729
tetex-xdvi-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 3a8899292f7029773c56778091b98d7ba8af2e6fce1aceb8819cf26e819583b5
s390
tetex-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: a5f67e972160ba64c682350f7254e06e93a1f5d0d1aba37878167f37140e53aa
tetex-afm-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 3adc8188ce13ad8662adc6b3a94238c5eca7258724b6375c6442fb3520b6ad5f
tetex-doc-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 53eeab2ae4fde0aba5cee232d6622863914398c7694554dc2216b3a3dd60cd77
tetex-dvips-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 117207ec257d5d2bc9e2e5e0d26cbfe56a830e7e8d7c7f65faf646e9f5c2bf54
tetex-fonts-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 9cbb3f2aeec3cf798a6c2ef173c901440174caef5d660a4bdcd21f2d9a0db618
tetex-latex-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 22ec9a2f2614844a9fc2b2d2ec7295f69501e0c36c550d839db129bf5e7c9377
tetex-xdvi-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: b0328b0fbed0d236eeebbd98dfb8faf5d0260a02701a39a99b0ed055274e1c07

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
s390x
tetex-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: bac79a9eafd5ab65d50c0b495904f12e35a28bc40fbf675ae1b6a684c1eefa86
tetex-afm-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 940089e7a5d1f91b5d742b0bfc0fa4c4baa6acf494e52c3a650dce91b94f32ac
tetex-doc-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: df20be8a13088dc61f3b43db8b471f5e17b15d3e585957288ec02d98d37d1328
tetex-dvips-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: a6b12b6b71669464d386bf19133108eb56bb91e39e8447c88f5488a06ff16d70
tetex-fonts-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: be3af1b1bdb548e3e04b5c2b56ed9995ddbb19042805777a6194c5d65167d58f
tetex-latex-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 21bdf34e135b5ad3f0a4dd25d05efabf1f0c3a174e2cdd87ca46a21cafcc9729
tetex-xdvi-2.0.2-22.0.1.EL4.16.s390x.rpm SHA-256: 3a8899292f7029773c56778091b98d7ba8af2e6fce1aceb8819cf26e819583b5
s390
tetex-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: a5f67e972160ba64c682350f7254e06e93a1f5d0d1aba37878167f37140e53aa
tetex-afm-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 3adc8188ce13ad8662adc6b3a94238c5eca7258724b6375c6442fb3520b6ad5f
tetex-doc-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 53eeab2ae4fde0aba5cee232d6622863914398c7694554dc2216b3a3dd60cd77
tetex-dvips-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 117207ec257d5d2bc9e2e5e0d26cbfe56a830e7e8d7c7f65faf646e9f5c2bf54
tetex-fonts-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 9cbb3f2aeec3cf798a6c2ef173c901440174caef5d660a4bdcd21f2d9a0db618
tetex-latex-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: 22ec9a2f2614844a9fc2b2d2ec7295f69501e0c36c550d839db129bf5e7c9377
tetex-xdvi-2.0.2-22.0.1.EL4.16.s390.rpm SHA-256: b0328b0fbed0d236eeebbd98dfb8faf5d0260a02701a39a99b0ed055274e1c07

Red Hat Enterprise Linux for Power, big endian 4

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
ppc
tetex-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 7086f8f9b6a5f85ed83910c032fe6911667ee1298d3268ef707ad9382add0909
tetex-afm-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 4b729b1dee7e55e7f6690e6ff471a3d81998594df9cf55d698c0814976cfd855
tetex-doc-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 3684a0c462987ef091fbb8adeaa750c66661ea7db760e9bc0c6996723c90dac0
tetex-dvips-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 928808a40441aef7ecb40efa4a29a30927f763639afe5e453061bb4a2c0b40b6
tetex-fonts-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: c01ce4deb3303cc7f9d13037c505924f043a6deb6938fd042c0bde607429f62d
tetex-latex-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 70fa95bc3ea53bee2c68601cc2e3dc8b3e51daafbe98c465a8b628e7627bc09f
tetex-xdvi-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 4d480134b6369af5594e9c9dbcff33ca63198d74585a17b3f0a17d312c37b9d9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
tetex-2.0.2-22.0.1.EL4.16.src.rpm SHA-256: 7655c898e589c29172764097a10e2a50a85efa4d1b63ec1c38f51afd208332a1
ppc
tetex-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 7086f8f9b6a5f85ed83910c032fe6911667ee1298d3268ef707ad9382add0909
tetex-afm-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 4b729b1dee7e55e7f6690e6ff471a3d81998594df9cf55d698c0814976cfd855
tetex-doc-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 3684a0c462987ef091fbb8adeaa750c66661ea7db760e9bc0c6996723c90dac0
tetex-dvips-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 928808a40441aef7ecb40efa4a29a30927f763639afe5e453061bb4a2c0b40b6
tetex-fonts-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: c01ce4deb3303cc7f9d13037c505924f043a6deb6938fd042c0bde607429f62d
tetex-latex-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 70fa95bc3ea53bee2c68601cc2e3dc8b3e51daafbe98c465a8b628e7627bc09f
tetex-xdvi-2.0.2-22.0.1.EL4.16.ppc.rpm SHA-256: 4d480134b6369af5594e9c9dbcff33ca63198d74585a17b3f0a17d312c37b9d9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility