{"id":"RHSA-2010:0400","summary":"Red Hat Security Advisory: tetex security update","modified":"2026-01-14T11:04:08.701094Z","published":"2024-09-15T18:24:16Z","upstream":["CVE-2009-0146","CVE-2009-0147","CVE-2009-0166","CVE-2009-0195","CVE-2009-0791","CVE-2009-0799","CVE-2009-0800","CVE-2009-1179","CVE-2009-1180","CVE-2009-1181","CVE-2009-1182","CVE-2009-1183","CVE-2009-3608","CVE-2009-3609","CVE-2010-0739","CVE-2010-0829","CVE-2010-1440"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=491840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=526637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=526893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=572941"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=573999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=586819"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0400.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0146"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0146"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0147"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0147"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0195"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0195"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0791"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0791"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0791"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0799"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0799"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0799"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-0800"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-0800"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0800"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-1179"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-1179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1179"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-1180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-1180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1180"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-1181"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-1181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1181"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-1182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-1182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1182"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-1183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-1183"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1183"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-3608"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-3608"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3608"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2009-3609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2009-3609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3609"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2010-0739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2010-0739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0739"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2010-0829"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2010-0829"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0829"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2010-1440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2010-1440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1440"}],"affected":[{"package":{"name":"tetex","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-afm","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-afm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-doc","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-dvips","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-dvips"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-fonts","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-fonts"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-latex","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-latex"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-xdvi","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/tetex-xdvi"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-afm","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-afm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-doc","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-dvips","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-dvips"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-fonts","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-fonts"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-latex","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-latex"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}},{"package":{"name":"tetex-xdvi","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/tetex-xdvi"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0-33.8.el5_5.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2010:0400.json"}}],"schema_version":"1.7.3"}