Re: Missing public key -- Re: [SECURITY] [DSA 1835-1] New tiff packages fix several vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Lukas Faulstich wrote:
> apt-get was not able to authenticate the security updates from DSA-1835-1
> due to a missing public key (see Listing 1 below). Furthermore, I was not
> able to verify the security advisory because I could not connect to
> keyring.debian.org, although I was able to ping it, see Listing 2 below.
>
> How should I proceed? Are the security updates maybe corrupted? Thanks in
> advance for your help,
>
> Lukas Faulstich
>
> PS: I suggest to add the topic "how to obtain the public key for verifying
> Debian Security Advisories" to http://www.debian.org/security/faq
>
>
> Listing1:
> # apt-get update
> Hole:1 http://security.debian.org etch/updates Release.gpg [835B]
> OK http://security.debian.org etch/updates Release
> Fehl http://security.debian.org etch/updates Release
>
> Hole:2 http://security.debian.org etch/updates Release [37,6kB]
> Ign http://security.debian.org etch/updates Release
> Ign http://security.debian.org etch/updates/main Packages/DiffIndex
> OK http://security.debian.org etch/updates/main Packages
> Es wurden 38,5kB in 1s geholt (21,1kB/s)
> Paketlisten werden gelesen... Fertig
> W: GPG error: http://security.debian.org etch/updates Release: Die
> folgenden Signaturen konnten nicht überprüft werden, weil ihr öffentlicher
> Schlüssel nicht verfügbar ist: NO_PUBKEY 9AA38DCD55BE302B
> W: Probieren Sie »apt-get update«, um diese Probleme zu korrigieren.
>
> # apt-get upgrade
> Paketlisten werden gelesen... Fertig
> Abhängigkeitsbaum wird aufgebaut... Fertig
> Die folgenden Pakete werden aktualisiert:
> libtiff4
> 1 aktualisiert, 0 neu installiert, 0 zu entfernen und 0 nicht aktualisiert.
> Es müssen 483kB Archive geholt werden.
> Nach dem Auspacken werden 49,2kB Plattenplatz zusätzlich benutzt.
> Möchten Sie fortfahren [J/n]? j
> WARNUNG: Die folgenden Pakete können nicht authentifiziert werden!
> libtiff4
> Diese Pakete ohne Überprüfung installieren [j/N]? N
> E: Einige Pakete konnten nicht authentifiziert werden
>
>
> Listing2:
>> gpg --keyserver keyring.debian.org --search-keys security@debian.org
> gpg: searching for "security@debian.org" from hkp server keyring.debian.org
> ?: keyring.debian.org: Connection refused
> gpgkeys: HTTP search error 7: couldn't connect: Connection refused
> gpg: key "security@debian.org" not found on keyserver
> gpg: keyserver internal error
> gpg: keyserver search failed: keyserver error
>> ping keyring.debian.org
> PING keyring.debian.org (82.195.75.107) 56(84) bytes of data.
> 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=1 ttl=54
> time=66.1 ms
> 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=2 ttl=54
> time=66.0 ms
> 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=3 ttl=54
> time=68.4 ms
>
> --- keyring.debian.org ping statistics ---
> 3 packets transmitted, 3 received, 0% packet loss, time 1998ms
> rtt min/avg/max/mdev = 66.091/66.885/68.465/1.136 ms
>
>
> ------------------------------------------------------------------------
> Debian Security Advisory DSA-1835-1 security@debian.org
> http://www.debian.org/security/ Moritz Muehlenhoff
> July 15, 2009 http://www.debian.org/security/faq
> ------------------------------------------------------------------------
>
> Package : tiff
> Vulnerability : several
> Problem type : local(remote)
> Debian-specific: no
> CVE Id(s) : CVE-2009-2285 CVE-2009-2347
> Debian Bug : 534137
>
> Several vulnerabilities have been discovered in the library for the
> Tag Image File Format (TIFF). The Common Vulnerabilities and Exposures
> project identifies the following problems:
>
> CVE-2009-2285
>
> It was discovered that malformed TIFF images can lead to a crash
> in the decompression code, resulting in denial of service.
>
> CVE-2009-2347
>
> Andrea Barisani discovered several integer overflows, which
> can lead to the execution of arbitrary code if malformed
> images are passed to the rgb2ycbcr or tiff2rgba tools.
>
> For the old stable distribution (etch), these problems have been fixed
> in version 3.8.2-7+etch3.
>
> For the stable distribution (lenny), these problems have been fixed in
> version 3.8.2-11.2.
>
> For the unstable distribution (sid), these problems will be fixed soon.
>
> We recommend that you upgrade your tiff packages.
>
> Upgrade instructions
> --------------------
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 4.0 alias etch
> -------------------------------
>
> Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64,
> mips, mipsel, powerpc, s390 and sparc.
>
> Source archives:
>
> http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch3.dsc
> Size/MD5 checksum: 762 36f73ea87004a60aab14631f13d3471b
> http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch3.diff.gz
> Size/MD5 checksum: 18868 e052c2395ca6c0f7e3f8af8891a4a58c
>
> alpha architecture (DEC Alpha)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_alpha.deb
> Size/MD5 checksum: 296942 111a269342351ea17df42220da828f10
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_alpha.deb
> Size/MD5 checksum: 5150 d30d96aee257911bb31f7b2edc787910
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_alpha.deb
> Size/MD5 checksum: 507488 9116610934053314a4381f45ecb5c74c
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_alpha.deb
> Size/MD5 checksum: 207572 980945ad1d2cb4f850fbfc571ee22881
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_alpha.deb
> Size/MD5 checksum: 11290 04212bd484cc3182dd2032e112e6cb04
>
> amd64 architecture (AMD x86_64 (AMD64))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_amd64.deb
> Size/MD5 checksum: 248094 39bddfebcb9817a32c5384dfb00e74f4
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_amd64.deb
> Size/MD5 checksum: 4928 6b3cef2bbed56f07dda4c7030decb885
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_amd64.deb
> Size/MD5 checksum: 10296 f05b715568050045aaa09f5fc0c411ea
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_amd64.deb
> Size/MD5 checksum: 183836 09b83f517d72bb367474ef19fd44745e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_amd64.deb
> Size/MD5 checksum: 489394 938b279275a47560cfc657975cdd891e
>
> arm architecture (ARM)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_arm.deb
> Size/MD5 checksum: 9978 e56eb8f02f9cda4d3f85087801093bf3
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_arm.deb
> Size/MD5 checksum: 4420 646ec0aab1389b2d15624777e98c3424
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_arm.deb
> Size/MD5 checksum: 236180 14f129fa7e425057ac3150cb25b910dc
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_arm.deb
> Size/MD5 checksum: 499350 d50887f9ad506832583d53fbc2150687
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_arm.deb
> Size/MD5 checksum: 181140 d97dce9dd3c76ac562aca729639bea49
>
> hppa architecture (HP PA RISC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_hppa.deb
> Size/MD5 checksum: 10886 a8a0b324c7eadbab319d053f5ffa8b75
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_hppa.deb
> Size/MD5 checksum: 196152 e50a64940c53351042db9e354adec121
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_hppa.deb
> Size/MD5 checksum: 267962 143480ae705b8bf34f9857bda9f56db6
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_hppa.deb
> Size/MD5 checksum: 515796 8d3ec336799f358b42581fd92586cf66
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_hppa.deb
> Size/MD5 checksum: 6004 d080e0a85557cc7fca4d07b7c1022e47
>
> i386 architecture (Intel ia32)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_i386.deb
> Size/MD5 checksum: 5012 5e8b86ed2dc5efe32559556e1abeb59e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_i386.deb
> Size/MD5 checksum: 175630 1ed6abc2557ccbdacfc38ca67290868a
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_i386.deb
> Size/MD5 checksum: 9860 77eed101177448e2eb9c5b696b9f9b05
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_i386.deb
> Size/MD5 checksum: 233494 58ae9a5e29486caed9b27d74395fd69e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_i386.deb
> Size/MD5 checksum: 483206 98ab5ac548af4998db017f6dc568821e
>
> ia64 architecture (Intel ia64)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_ia64.deb
> Size/MD5 checksum: 13170 f946d23c3f894b312c7f6d33ded01d4b
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_ia64.deb
> Size/MD5 checksum: 251070 3e6a616ac15acf9baf87327a7bdcb3e6
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_ia64.deb
> Size/MD5 checksum: 326196 95d71750ad5502543377ff0739d6b2a3
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_ia64.deb
> Size/MD5 checksum: 6722 dccfb36e482dd7e8f61a49a7492ab4b5
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_ia64.deb
> Size/MD5 checksum: 552342 ae85fb2298db8aa66f12d45f9e7d0000
>
> mips architecture (MIPS (Big Endian))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_mips.deb
> Size/MD5 checksum: 10658 ea25cb0f6a6c018d175644da7123c613
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_mips.deb
> Size/MD5 checksum: 485344 b4ee0a92d46408238bd14e2761eb3a60
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_mips.deb
> Size/MD5 checksum: 188386 2ca5227913d149c2c3901dd127ce51c1
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_mips.deb
> Size/MD5 checksum: 264386 0a089d68e60d52945c552a0b91a194d1
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_mips.deb
> Size/MD5 checksum: 5158 8f74f09a323379d1b60de67faf979942
>
> mipsel architecture (MIPS (Little Endian))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_mipsel.deb
> Size/MD5 checksum: 188960 7fada9867fb319b84784b7b119603c6f
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_mipsel.deb
> Size/MD5 checksum: 10642 f57ba50e42a8ef4cd45396396990754e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_mipsel.deb
> Size/MD5 checksum: 264576 8e4e6441e12f37b5723847b7765097ad
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_mipsel.deb
> Size/MD5 checksum: 5138 766e8618f1c308ef64b24f5225103901
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_mipsel.deb
> Size/MD5 checksum: 485392 0f554374048d5574dd6860e34e770930
>
> powerpc architecture (PowerPC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_powerpc.deb
> Size/MD5 checksum: 504012 c9779c9112652cba3f26bab33afabfc7
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_powerpc.deb
> Size/MD5 checksum: 254060 672b8396f12b9e01434fa077e1611d86
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_powerpc.deb
> Size/MD5 checksum: 203862 afc47f6e981fba5e177bca43ff8b1a7b
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_powerpc.deb
> Size/MD5 checksum: 11812 57eb8b73df7a84bfe9e8fff861ea693f
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_powerpc.deb
> Size/MD5 checksum: 6694 213160fb71e26b30255c544e5e7fd69a
>
> s390 architecture (IBM S/390)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_s390.deb
> Size/MD5 checksum: 10722 6efc6c6950a795f58c6defceebb255ee
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_s390.deb
> Size/MD5 checksum: 5234 dde2c8e4d1c3bf64ff8cfada57450216
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_s390.deb
> Size/MD5 checksum: 248752 c9946c79b44fafcccd7bc4dc442a6392
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_s390.deb
> Size/MD5 checksum: 497694 ae661ad97a3e6847ccf6da0e4da7df8c
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_s390.deb
> Size/MD5 checksum: 182726 29728322bbe8decf9c728ebf3688e7d9
>
> sparc architecture (Sun SPARC/UltraSPARC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_sparc.deb
> Size/MD5 checksum: 495792 2dce34c146f793fb8c736b5134c3966d
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_sparc.deb
> Size/MD5 checksum: 238040 96385ebc347e32f74de93a66899e1d17
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_sparc.deb
> Size/MD5 checksum: 10232 65dd91095c8cd47fd76fb45a2da57067
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_sparc.deb
> Size/MD5 checksum: 172004 89717a135257703b170e34ee6c50e407
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_sparc.deb
> Size/MD5 checksum: 4694 f53e42c5430461b3b4890313b00f2f83
>
> Debian GNU/Linux 5.0 alias lenny
> --------------------------------
>
> Stable updates are available for alpha, amd64, arm, armel, hppa, i386,
> ia64, mips, mipsel, powerpc, s390 and sparc.
>
> Source archives:
>
> http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-11.2.dsc
> Size/MD5 checksum: 1196 c61acedd4493ae0f675ffc611219ae21
> http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-11.2.diff.gz
> Size/MD5 checksum: 39075 1985df0b4d4b6047d604c18ff9bcb901
>
> Architecture independent packages:
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-doc_3.8.2-11.2_all.deb
> Size/MD5 checksum: 383532 52b6d5fc17bf54e7c9d6327c2f21653d
>
> alpha architecture (DEC Alpha)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_alpha.deb
> Size/MD5 checksum: 183988 bd8137753496c3c2b21d91e19b78cc9f
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_alpha.deb
> Size/MD5 checksum: 339004 cb2edeb22053a3e944c81300272871e6
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_alpha.deb
> Size/MD5 checksum: 55812 9b24f1f8601883f4f6430afaf61b7be1
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_alpha.deb
> Size/MD5 checksum: 49812 3833a231e05944f57651d66da9fe5f97
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_alpha.deb
> Size/MD5 checksum: 252810 66c7b7e9f84dc2259f2f7f2776d521c6
>
> amd64 architecture (AMD x86_64 (AMD64))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_amd64.deb
> Size/MD5 checksum: 170674 5650754622d9598fa65202faba34130e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_amd64.deb
> Size/MD5 checksum: 232172 ace8a6e0347fc01734ebee80a7ef5587
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_amd64.deb
> Size/MD5 checksum: 54760 10c512849acfd403ee07cba11e474c8b
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_amd64.deb
> Size/MD5 checksum: 49680 920043baa061c9dbef860e41a3f1a583
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_amd64.deb
> Size/MD5 checksum: 293354 0af7a3bbc79749794ff48cdcecf4e43c
>
> arm architecture (ARM)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_arm.deb
> Size/MD5 checksum: 160320 9d0709f2b4a0da7148204c15382a8858
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_arm.deb
> Size/MD5 checksum: 48126 40ebc4cc7e3cf3dee951965da5bd8cd5
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_arm.deb
> Size/MD5 checksum: 277572 dc61062c6f02e859ed7ac4d624246121
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_arm.deb
> Size/MD5 checksum: 53500 117586c6131cc0ac775dcab14b8c0d5c
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_arm.deb
> Size/MD5 checksum: 226998 113904ba4dc113aaa715617fd61aaeb7
>
> armel architecture (ARM EABI)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_armel.deb
> Size/MD5 checksum: 234136 a9347e98a82b04fe6f2f1654d2c6029e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_armel.deb
> Size/MD5 checksum: 161720 4bb949d04e6d28ca9b976233108d2d6a
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_armel.deb
> Size/MD5 checksum: 55974 eb4eb7f937d988488bcdc1f7b64712cf
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_armel.deb
> Size/MD5 checksum: 48504 e3dc565032463e605f72119f4495a419
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_armel.deb
> Size/MD5 checksum: 278336 0b7b73cefac726ee7ac4e00d900227ca
>
> hppa architecture (HP PA RISC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_hppa.deb
> Size/MD5 checksum: 176202 f6445adc8cb99cee5a472f12cf6fb90e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_hppa.deb
> Size/MD5 checksum: 54680 5a6e9fc86aa6eef314899535100f7105
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_hppa.deb
> Size/MD5 checksum: 240752 555bb7db50f993fdb3849b313842cefe
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_hppa.deb
> Size/MD5 checksum: 309034 5179d2dcf94f1b10a75caae7be808cc9
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_hppa.deb
> Size/MD5 checksum: 49876 818f43b0c535417d3acaa94ec1ca9844
>
> i386 architecture (Intel ia32)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_i386.deb
> Size/MD5 checksum: 48826 fc39da66ddff0e33e9b0d51b2248601a
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_i386.deb
> Size/MD5 checksum: 218506 939da912792c676786664fd2996a9745
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_i386.deb
> Size/MD5 checksum: 53384 3c5a7d5ad8f7fcad57441170e7e76702
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_i386.deb
> Size/MD5 checksum: 275694 f3041b4462b8142ef2bf0229ccf4928c
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_i386.deb
> Size/MD5 checksum: 161018 42b1c14eb094d0bc14247fb812a495bb
>
> ia64 architecture (Intel ia64)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_ia64.deb
> Size/MD5 checksum: 229558 d65d3370566c1b3ab9386b27b8fe1ef8
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_ia64.deb
> Size/MD5 checksum: 50526 0334f51430892eb504fa49db6fabd4db
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_ia64.deb
> Size/MD5 checksum: 369350 741d24b7c42e2a44b28934156297ff88
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_ia64.deb
> Size/MD5 checksum: 56920 171af454e1f47761d5e3629a30816cf3
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_ia64.deb
> Size/MD5 checksum: 293788 db7390b4c93157e02f6ee49b6f13f010
>
> mips architecture (MIPS (Big Endian))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_mips.deb
> Size/MD5 checksum: 164126 fc7a6f5704e49fb631591d3c9089c4d8
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_mips.deb
> Size/MD5 checksum: 307262 9a614840c5a856c721f4322562e97144
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_mips.deb
> Size/MD5 checksum: 228056 8ea8ae92f72428da8d989c229dcfeb4e
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_mips.deb
> Size/MD5 checksum: 54406 033f6bf865b2b07611793376064c69ea
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_mips.deb
> Size/MD5 checksum: 49100 1ae3cf735a53a024473395319241cb18
>
> mipsel architecture (MIPS (Little Endian))
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_mipsel.deb
> Size/MD5 checksum: 49072 f280e6e5ca2b2ac838de98f6a85a4893
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_mipsel.deb
> Size/MD5 checksum: 54382 86c36d3914ad522339e36e5a71960021
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_mipsel.deb
> Size/MD5 checksum: 307464 fcfbb56d36139c61661bc315c40f1d0d
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_mipsel.deb
> Size/MD5 checksum: 164436 f903e60e9f30f234370c6f7f95c4e395
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_mipsel.deb
> Size/MD5 checksum: 228856 6bd4840b0cf0d3597f02e6489e050c88
>
> powerpc architecture (PowerPC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_powerpc.deb
> Size/MD5 checksum: 56962 482b92a6b06ba0f64ef9e32d550ecb35
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_powerpc.deb
> Size/MD5 checksum: 269026 b2289198ee2c5a8337bca51dc994e638
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_powerpc.deb
> Size/MD5 checksum: 298288 efff01b1a658b490b72c86f55116bf0b
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_powerpc.deb
> Size/MD5 checksum: 173366 da8cb4e7f7374ad0a589912fbf33aaf3
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_powerpc.deb
> Size/MD5 checksum: 51416 bd082e1d2672d6e15a5c44f948251994
>
> s390 architecture (IBM S/390)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_s390.deb
> Size/MD5 checksum: 292956 8251186b6718059bbd6467b9b0c15bda
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_s390.deb
> Size/MD5 checksum: 230810 2ba2bb2867eedef08a36743085d3e8b2
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_s390.deb
> Size/MD5 checksum: 176174 dde8e1d1b15b76136efc54a0fb31ceee
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_s390.deb
> Size/MD5 checksum: 54786 2e0589c84040dd8cf5e383e61440c45b
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_s390.deb
> Size/MD5 checksum: 49062 33e6cd29cfbba31d181a83beae1413b0
>
> sparc architecture (Sun SPARC/UltraSPARC)
>
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_sparc.deb
> Size/MD5 checksum: 54150 4495237de528ae6098ab72cb5169bf65
> http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_sparc.deb
> Size/MD5 checksum: 222798 e5cd11c6bead4350f603505913d3df13
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_sparc.deb
> Size/MD5 checksum: 280310 49ff3125e71d13a9ac4bebdd0fc9d55f
> http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_sparc.deb
> Size/MD5 checksum: 48336 792f74e17a925458c46327bd767964ab
> http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_sparc.deb
> Size/MD5 checksum: 158624 3dd4698acd3804ca878e90a846b6b659
>
>
> These files will probably be moved into the stable distribution on
> its next update.
>
> -
> ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security
> dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
>
>
>
>
>
>
>
>
>
>
>>
>>
- --
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
>>
>>
>>
i don't know deutush but i think you need to do this
gpg --keyserver subkeys.pgp.net --recv-key 9AA38DCD55BE302B
gpg --armor --export 9AA38DCD55BE302B | apt-key add -
see you
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkpebtgACgkQIjqejaX9O3BK/wCfY5iNh7d0zSwtPYTOKGk68rqS
X6MAnAlUEWmKTOiz5DTMsqmxSE8Beoqr
=ZqLN
-----END PGP SIGNATURE-----
begin:vcard
fn:alice ferrazzi
n:ferrazzi;alice
email;internet:aliceinwire@gnumerica.org
x-mozilla-html:FALSE
version:2.1
end:vcard
Reply to: