apt-get was not able to authenticate the security updates from DSA-1835-1 due to a missing public key (see Listing 1 below). Furthermore, I was not able to verify the security advisory because I could not connect to keyring.debian.org, although I was able to ping it, see Listing 2 below.
How should I proceed? Are the security updates maybe corrupted? Thanks in advance for your help, Lukas Faulstich PS: I suggest to add the topic "how to obtain the public key for verifying Debian Security Advisories" to http://www.debian.org/security/faq Listing1: # apt-get update Hole:1 http://security.debian.org etch/updates Release.gpg [835B] OK http://security.debian.org etch/updates Release Fehl http://security.debian.org etch/updates Release Hole:2 http://security.debian.org etch/updates Release [37,6kB] Ign http://security.debian.org etch/updates Release Ign http://security.debian.org etch/updates/main Packages/DiffIndex OK http://security.debian.org etch/updates/main Packages Es wurden 38,5kB in 1s geholt (21,1kB/s) Paketlisten werden gelesen... Fertig W: GPG error: http://security.debian.org etch/updates Release: Die folgenden Signaturen konnten nicht überprüft werden, weil ihr öffentlicher Schlüssel nicht verfügbar ist: NO_PUBKEY 9AA38DCD55BE302B W: Probieren Sie »apt-get update«, um diese Probleme zu korrigieren. # apt-get upgrade Paketlisten werden gelesen... Fertig Abhängigkeitsbaum wird aufgebaut... Fertig Die folgenden Pakete werden aktualisiert: libtiff4 1 aktualisiert, 0 neu installiert, 0 zu entfernen und 0 nicht aktualisiert. Es müssen 483kB Archive geholt werden. Nach dem Auspacken werden 49,2kB Plattenplatz zusätzlich benutzt. Möchten Sie fortfahren [J/n]? j WARNUNG: Die folgenden Pakete können nicht authentifiziert werden! libtiff4 Diese Pakete ohne Überprüfung installieren [j/N]? N E: Einige Pakete konnten nicht authentifiziert werden Listing2: > gpg --keyserver keyring.debian.org --search-keys [email protected] gpg: searching for "[email protected]" from hkp server keyring.debian.org ?: keyring.debian.org: Connection refused gpgkeys: HTTP search error 7: couldn't connect: Connection refused gpg: key "[email protected]" not found on keyserver gpg: keyserver internal error gpg: keyserver search failed: keyserver error > ping keyring.debian.org PING keyring.debian.org (82.195.75.107) 56(84) bytes of data. 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=1 ttl=54 time=66.1 ms 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=2 ttl=54 time=66.0 ms 64 bytes from kaufmann.debian.org (82.195.75.107): icmp_seq=3 ttl=54 time=68.4 ms --- keyring.debian.org ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 1998ms rtt min/avg/max/mdev = 66.091/66.885/68.465/1.136 ms > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------ > Debian Security Advisory DSA-1835-1 [email protected] > http://www.debian.org/security/ Moritz Muehlenhoff > July 15, 2009 http://www.debian.org/security/faq > - ------------------------------------------------------------------------ > > Package : tiff > Vulnerability : several > Problem type : local(remote) > Debian-specific: no > CVE Id(s) : CVE-2009-2285 CVE-2009-2347 > Debian Bug : 534137 > > Several vulnerabilities have been discovered in the library for the > Tag Image File Format (TIFF). The Common Vulnerabilities and Exposures > project identifies the following problems: > > CVE-2009-2285 > > It was discovered that malformed TIFF images can lead to a crash > in the decompression code, resulting in denial of service. > > CVE-2009-2347 > > Andrea Barisani discovered several integer overflows, which > can lead to the execution of arbitrary code if malformed > images are passed to the rgb2ycbcr or tiff2rgba tools. > > For the old stable distribution (etch), these problems have been fixed > in version 3.8.2-7+etch3. > > For the stable distribution (lenny), these problems have been fixed in > version 3.8.2-11.2. > > For the unstable distribution (sid), these problems will be fixed soon. > > We recommend that you upgrade your tiff packages. > > Upgrade instructions > - -------------------- > > wget url > will fetch the file for you > dpkg -i file.deb > will install the referenced file. > > If you are using the apt-get package manager, use the line for > sources.list as given below: > > apt-get update > will update the internal database > apt-get upgrade > will install corrected packages > > You may use an automated update by adding the resources from the > footer to the proper configuration. > > > Debian GNU/Linux 4.0 alias etch > - ------------------------------- > > Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, > mips, mipsel, powerpc, s390 and sparc. > > Source archives: > > http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch3.dsc > Size/MD5 checksum: 762 36f73ea87004a60aab14631f13d3471b > > http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch3.diff.gz > Size/MD5 checksum: 18868 e052c2395ca6c0f7e3f8af8891a4a58c > > alpha architecture (DEC Alpha) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_alpha.deb > Size/MD5 checksum: 296942 111a269342351ea17df42220da828f10 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_alpha.deb > Size/MD5 checksum: 5150 d30d96aee257911bb31f7b2edc787910 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_alpha.deb > Size/MD5 checksum: 507488 9116610934053314a4381f45ecb5c74c > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_alpha.deb > Size/MD5 checksum: 207572 980945ad1d2cb4f850fbfc571ee22881 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_alpha.deb > Size/MD5 checksum: 11290 04212bd484cc3182dd2032e112e6cb04 > > amd64 architecture (AMD x86_64 (AMD64)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_amd64.deb > Size/MD5 checksum: 248094 39bddfebcb9817a32c5384dfb00e74f4 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_amd64.deb > Size/MD5 checksum: 4928 6b3cef2bbed56f07dda4c7030decb885 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_amd64.deb > Size/MD5 checksum: 10296 f05b715568050045aaa09f5fc0c411ea > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_amd64.deb > Size/MD5 checksum: 183836 09b83f517d72bb367474ef19fd44745e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_amd64.deb > Size/MD5 checksum: 489394 938b279275a47560cfc657975cdd891e > > arm architecture (ARM) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_arm.deb > Size/MD5 checksum: 9978 e56eb8f02f9cda4d3f85087801093bf3 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_arm.deb > Size/MD5 checksum: 4420 646ec0aab1389b2d15624777e98c3424 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_arm.deb > Size/MD5 checksum: 236180 14f129fa7e425057ac3150cb25b910dc > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_arm.deb > Size/MD5 checksum: 499350 d50887f9ad506832583d53fbc2150687 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_arm.deb > Size/MD5 checksum: 181140 d97dce9dd3c76ac562aca729639bea49 > > hppa architecture (HP PA RISC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_hppa.deb > Size/MD5 checksum: 10886 a8a0b324c7eadbab319d053f5ffa8b75 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_hppa.deb > Size/MD5 checksum: 196152 e50a64940c53351042db9e354adec121 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_hppa.deb > Size/MD5 checksum: 267962 143480ae705b8bf34f9857bda9f56db6 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_hppa.deb > Size/MD5 checksum: 515796 8d3ec336799f358b42581fd92586cf66 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_hppa.deb > Size/MD5 checksum: 6004 d080e0a85557cc7fca4d07b7c1022e47 > > i386 architecture (Intel ia32) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_i386.deb > Size/MD5 checksum: 5012 5e8b86ed2dc5efe32559556e1abeb59e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_i386.deb > Size/MD5 checksum: 175630 1ed6abc2557ccbdacfc38ca67290868a > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_i386.deb > Size/MD5 checksum: 9860 77eed101177448e2eb9c5b696b9f9b05 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_i386.deb > Size/MD5 checksum: 233494 58ae9a5e29486caed9b27d74395fd69e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_i386.deb > Size/MD5 checksum: 483206 98ab5ac548af4998db017f6dc568821e > > ia64 architecture (Intel ia64) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_ia64.deb > Size/MD5 checksum: 13170 f946d23c3f894b312c7f6d33ded01d4b > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_ia64.deb > Size/MD5 checksum: 251070 3e6a616ac15acf9baf87327a7bdcb3e6 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_ia64.deb > Size/MD5 checksum: 326196 95d71750ad5502543377ff0739d6b2a3 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_ia64.deb > Size/MD5 checksum: 6722 dccfb36e482dd7e8f61a49a7492ab4b5 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_ia64.deb > Size/MD5 checksum: 552342 ae85fb2298db8aa66f12d45f9e7d0000 > > mips architecture (MIPS (Big Endian)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_mips.deb > Size/MD5 checksum: 10658 ea25cb0f6a6c018d175644da7123c613 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_mips.deb > Size/MD5 checksum: 485344 b4ee0a92d46408238bd14e2761eb3a60 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_mips.deb > Size/MD5 checksum: 188386 2ca5227913d149c2c3901dd127ce51c1 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_mips.deb > Size/MD5 checksum: 264386 0a089d68e60d52945c552a0b91a194d1 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_mips.deb > Size/MD5 checksum: 5158 8f74f09a323379d1b60de67faf979942 > > mipsel architecture (MIPS (Little Endian)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_mipsel.deb > Size/MD5 checksum: 188960 7fada9867fb319b84784b7b119603c6f > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_mipsel.deb > Size/MD5 checksum: 10642 f57ba50e42a8ef4cd45396396990754e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_mipsel.deb > Size/MD5 checksum: 264576 8e4e6441e12f37b5723847b7765097ad > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_mipsel.deb > Size/MD5 checksum: 5138 766e8618f1c308ef64b24f5225103901 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_mipsel.deb > Size/MD5 checksum: 485392 0f554374048d5574dd6860e34e770930 > > powerpc architecture (PowerPC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_powerpc.deb > Size/MD5 checksum: 504012 c9779c9112652cba3f26bab33afabfc7 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_powerpc.deb > Size/MD5 checksum: 254060 672b8396f12b9e01434fa077e1611d86 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_powerpc.deb > Size/MD5 checksum: 203862 afc47f6e981fba5e177bca43ff8b1a7b > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_powerpc.deb > Size/MD5 checksum: 11812 57eb8b73df7a84bfe9e8fff861ea693f > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_powerpc.deb > Size/MD5 checksum: 6694 213160fb71e26b30255c544e5e7fd69a > > s390 architecture (IBM S/390) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_s390.deb > Size/MD5 checksum: 10722 6efc6c6950a795f58c6defceebb255ee > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_s390.deb > Size/MD5 checksum: 5234 dde2c8e4d1c3bf64ff8cfada57450216 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_s390.deb > Size/MD5 checksum: 248752 c9946c79b44fafcccd7bc4dc442a6392 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_s390.deb > Size/MD5 checksum: 497694 ae661ad97a3e6847ccf6da0e4da7df8c > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_s390.deb > Size/MD5 checksum: 182726 29728322bbe8decf9c728ebf3688e7d9 > > sparc architecture (Sun SPARC/UltraSPARC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch3_sparc.deb > Size/MD5 checksum: 495792 2dce34c146f793fb8c736b5134c3966d > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch3_sparc.deb > Size/MD5 checksum: 238040 96385ebc347e32f74de93a66899e1d17 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch3_sparc.deb > Size/MD5 checksum: 10232 65dd91095c8cd47fd76fb45a2da57067 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch3_sparc.deb > Size/MD5 checksum: 172004 89717a135257703b170e34ee6c50e407 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch3_sparc.deb > Size/MD5 checksum: 4694 f53e42c5430461b3b4890313b00f2f83 > > Debian GNU/Linux 5.0 alias lenny > - -------------------------------- > > Stable updates are available for alpha, amd64, arm, armel, hppa, i386, > ia64, mips, mipsel, powerpc, s390 and sparc. > > Source archives: > > http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-11.2.dsc > Size/MD5 checksum: 1196 c61acedd4493ae0f675ffc611219ae21 > http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-11.2.diff.gz > Size/MD5 checksum: 39075 1985df0b4d4b6047d604c18ff9bcb901 > > Architecture independent packages: > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-doc_3.8.2-11.2_all.deb > Size/MD5 checksum: 383532 52b6d5fc17bf54e7c9d6327c2f21653d > > alpha architecture (DEC Alpha) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_alpha.deb > Size/MD5 checksum: 183988 bd8137753496c3c2b21d91e19b78cc9f > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_alpha.deb > Size/MD5 checksum: 339004 cb2edeb22053a3e944c81300272871e6 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_alpha.deb > Size/MD5 checksum: 55812 9b24f1f8601883f4f6430afaf61b7be1 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_alpha.deb > Size/MD5 checksum: 49812 3833a231e05944f57651d66da9fe5f97 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_alpha.deb > Size/MD5 checksum: 252810 66c7b7e9f84dc2259f2f7f2776d521c6 > > amd64 architecture (AMD x86_64 (AMD64)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_amd64.deb > Size/MD5 checksum: 170674 5650754622d9598fa65202faba34130e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_amd64.deb > Size/MD5 checksum: 232172 ace8a6e0347fc01734ebee80a7ef5587 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_amd64.deb > Size/MD5 checksum: 54760 10c512849acfd403ee07cba11e474c8b > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_amd64.deb > Size/MD5 checksum: 49680 920043baa061c9dbef860e41a3f1a583 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_amd64.deb > Size/MD5 checksum: 293354 0af7a3bbc79749794ff48cdcecf4e43c > > arm architecture (ARM) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_arm.deb > Size/MD5 checksum: 160320 9d0709f2b4a0da7148204c15382a8858 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_arm.deb > Size/MD5 checksum: 48126 40ebc4cc7e3cf3dee951965da5bd8cd5 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_arm.deb > Size/MD5 checksum: 277572 dc61062c6f02e859ed7ac4d624246121 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_arm.deb > Size/MD5 checksum: 53500 117586c6131cc0ac775dcab14b8c0d5c > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_arm.deb > Size/MD5 checksum: 226998 113904ba4dc113aaa715617fd61aaeb7 > > armel architecture (ARM EABI) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_armel.deb > Size/MD5 checksum: 234136 a9347e98a82b04fe6f2f1654d2c6029e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_armel.deb > Size/MD5 checksum: 161720 4bb949d04e6d28ca9b976233108d2d6a > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_armel.deb > Size/MD5 checksum: 55974 eb4eb7f937d988488bcdc1f7b64712cf > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_armel.deb > Size/MD5 checksum: 48504 e3dc565032463e605f72119f4495a419 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_armel.deb > Size/MD5 checksum: 278336 0b7b73cefac726ee7ac4e00d900227ca > > hppa architecture (HP PA RISC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_hppa.deb > Size/MD5 checksum: 176202 f6445adc8cb99cee5a472f12cf6fb90e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_hppa.deb > Size/MD5 checksum: 54680 5a6e9fc86aa6eef314899535100f7105 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_hppa.deb > Size/MD5 checksum: 240752 555bb7db50f993fdb3849b313842cefe > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_hppa.deb > Size/MD5 checksum: 309034 5179d2dcf94f1b10a75caae7be808cc9 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_hppa.deb > Size/MD5 checksum: 49876 818f43b0c535417d3acaa94ec1ca9844 > > i386 architecture (Intel ia32) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_i386.deb > Size/MD5 checksum: 48826 fc39da66ddff0e33e9b0d51b2248601a > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_i386.deb > Size/MD5 checksum: 218506 939da912792c676786664fd2996a9745 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_i386.deb > Size/MD5 checksum: 53384 3c5a7d5ad8f7fcad57441170e7e76702 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_i386.deb > Size/MD5 checksum: 275694 f3041b4462b8142ef2bf0229ccf4928c > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_i386.deb > Size/MD5 checksum: 161018 42b1c14eb094d0bc14247fb812a495bb > > ia64 architecture (Intel ia64) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_ia64.deb > Size/MD5 checksum: 229558 d65d3370566c1b3ab9386b27b8fe1ef8 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_ia64.deb > Size/MD5 checksum: 50526 0334f51430892eb504fa49db6fabd4db > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_ia64.deb > Size/MD5 checksum: 369350 741d24b7c42e2a44b28934156297ff88 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_ia64.deb > Size/MD5 checksum: 56920 171af454e1f47761d5e3629a30816cf3 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_ia64.deb > Size/MD5 checksum: 293788 db7390b4c93157e02f6ee49b6f13f010 > > mips architecture (MIPS (Big Endian)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_mips.deb > Size/MD5 checksum: 164126 fc7a6f5704e49fb631591d3c9089c4d8 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_mips.deb > Size/MD5 checksum: 307262 9a614840c5a856c721f4322562e97144 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_mips.deb > Size/MD5 checksum: 228056 8ea8ae92f72428da8d989c229dcfeb4e > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_mips.deb > Size/MD5 checksum: 54406 033f6bf865b2b07611793376064c69ea > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_mips.deb > Size/MD5 checksum: 49100 1ae3cf735a53a024473395319241cb18 > > mipsel architecture (MIPS (Little Endian)) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_mipsel.deb > Size/MD5 checksum: 49072 f280e6e5ca2b2ac838de98f6a85a4893 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_mipsel.deb > Size/MD5 checksum: 54382 86c36d3914ad522339e36e5a71960021 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_mipsel.deb > Size/MD5 checksum: 307464 fcfbb56d36139c61661bc315c40f1d0d > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_mipsel.deb > Size/MD5 checksum: 164436 f903e60e9f30f234370c6f7f95c4e395 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_mipsel.deb > Size/MD5 checksum: 228856 6bd4840b0cf0d3597f02e6489e050c88 > > powerpc architecture (PowerPC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_powerpc.deb > Size/MD5 checksum: 56962 482b92a6b06ba0f64ef9e32d550ecb35 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_powerpc.deb > Size/MD5 checksum: 269026 b2289198ee2c5a8337bca51dc994e638 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_powerpc.deb > Size/MD5 checksum: 298288 efff01b1a658b490b72c86f55116bf0b > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_powerpc.deb > Size/MD5 checksum: 173366 da8cb4e7f7374ad0a589912fbf33aaf3 > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_powerpc.deb > Size/MD5 checksum: 51416 bd082e1d2672d6e15a5c44f948251994 > > s390 architecture (IBM S/390) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_s390.deb > Size/MD5 checksum: 292956 8251186b6718059bbd6467b9b0c15bda > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_s390.deb > Size/MD5 checksum: 230810 2ba2bb2867eedef08a36743085d3e8b2 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_s390.deb > Size/MD5 checksum: 176174 dde8e1d1b15b76136efc54a0fb31ceee > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_s390.deb > Size/MD5 checksum: 54786 2e0589c84040dd8cf5e383e61440c45b > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_s390.deb > Size/MD5 checksum: 49062 33e6cd29cfbba31d181a83beae1413b0 > > sparc architecture (Sun SPARC/UltraSPARC) > > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-11.2_sparc.deb > Size/MD5 checksum: 54150 4495237de528ae6098ab72cb5169bf65 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-11.2_sparc.deb > Size/MD5 checksum: 222798 e5cd11c6bead4350f603505913d3df13 > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-11.2_sparc.deb > Size/MD5 checksum: 280310 49ff3125e71d13a9ac4bebdd0fc9d55f > > http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-11.2_sparc.deb > Size/MD5 checksum: 48336 792f74e17a925458c46327bd767964ab > > http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-11.2_sparc.deb > Size/MD5 checksum: 158624 3dd4698acd3804ca878e90a846b6b659 > > > These files will probably be moved into the stable distribution on > its next update. > > - > --------------------------------------------------------------------------------- > For apt-get: deb http://security.debian.org/ stable/updates main > For dpkg-ftp: ftp://security.debian.org/debian-security > dists/stable/updates/main > Mailing list: [email protected] > Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> > > > > > > > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (GNU/Linux) > > iEYEARECAAYFAkpeK6sACgkQXm3vHE4uyloI/wCfX9SO7ITCG1plypSniHl2FPq7 > pW0AoNbuOAvrNoQVaM8VAhpSK3dlF7/o > =4FZN > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to [email protected] > with a subject of "unsubscribe". Trouble? Contact > [email protected] > > > -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

