tetex is vulnerable to denial of service (DoS). The vulnerability exists as multiple array index errors were found in the way teTeX converted DVI files into the Portable Network Graphics (PNG) format. An attacker could create a malicious DVI file that would cause the dvipng executable to crash.
lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html
lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
secunia.com/advisories/39914
www.debian.org/security/2010/dsa-2048
www.redhat.com/security/updates/classification/#moderate
www.ubuntu.com/usn/USN-936-1
www.vupen.com/english/advisories/2010/1219
access.redhat.com/errata/RHSA-2010:0400
bugzilla.redhat.com/show_bug.cgi?id=573999
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718