-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1502
                New cups packages fix cross-site scripting
                             10 November 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cups
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2009-2820  

Reference:         ESB-2009.1500

Original Bulletin: 
   http://www.debian.org/security/2009/dsa-1933

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running cups check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1933-1                  security@debian.org
http://www.debian.org/security/                      Steffen Joeris
November 10, 2009                     http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : cups
Vulnerability  : missing input sanitising
Problem type   : remote
Debian-specific: no
CVE Id         : CVE-2009-2820


Aaron Siegel discovered that the web interface of cups, the Common UNIX
Printing System, is prone to cross-site scripting attacks.


For the stable distribution (lenny), this problem has been fixed in
version 1.3.8-1+lenny7.

For the oldstable distribution (etch), this problem has been fixed in
version 1.2.7-4+etch9.

For the testing distribution (squeeze) and the unstable distribution
(sid), this problem will be fixed soon.


We recommend that you upgrade your cups packages.


Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- - -------------------------------

Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Debian (oldstable)
- - ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz
    Size/MD5 checksum:  4214272 c9ba33356e5bb93efbcf77b6e142e498
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9.diff.gz
    Size/MD5 checksum:   112995 fe3566daa6615bcd625288ce98e9384f
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9.dsc
    Size/MD5 checksum:     1095 804241054cda1301d183492ea5969649

Architecture independent packages:

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4+etch9_all.deb
    Size/MD5 checksum:   917720 bc97c75dacbd345dfd07e9397c91c38f
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4+etch9_all.deb
    Size/MD5 checksum:    46524 4f95c2485efda6dc7fc306162a5b1641

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:    72990 bf27b53404f44fcea401f8ff88de8aa2
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:  1095268 d25ffb1cdb0d32cb3d80d6a551b355c7
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:   184818 00aa5f531b8c3a30c6c77b926be722d2
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:   175652 d52f9ee130bbf84d5436a71bb526f56c
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:    95922 8d80f7b83c755b59401fa7dd0b2ca81e
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:  1605614 26620cc74617e392217a198fbde74860
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:    86404 5cebb372c4230f6ec95f89be9183293c
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_alpha.deb
    Size/MD5 checksum:    39290 429780ee5c35d47504291877979b6a15

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:   162858 1efc0ec7be9fc17ec25aab13eeb6e169
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:    80712 2f639382f1e7767254a39358e7a79aed
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:  1090142 e33720ca87a04a87fe9a23b281c1bac0
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:    86648 7eacddf27156689a52fe3b620392f734
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:  1578128 1726cfeb573c14d325bd7d3c6ec29188
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:    53050 342387c9d81a32530263493d8a11eb86
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:   142540 66ff1c8c7c2bae7320d208e1ac6748c5
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_amd64.deb
    Size/MD5 checksum:    36356 a752bf52d8c59b7e7b16a44e6265da78

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:    78688 9ee5e250e8db317459cf64f0f4d2b9e9
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:   155024 2e0ba671643828c8a208647ffc267b64
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:    85562 05a0e3e5bbcc37c3a22e5e5343bbc44d
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:  1569288 8871122b1793c0e6f24e10fb781e0cb9
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:    48948 9c51ba4c36e7fc6c4dbd2da98be31557
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:  1024098 d942cccf63a8013a157f6cd8b8091a77
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:    36760 f4f9b00a6516aaad65423afdb7cc15c3
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_arm.deb
    Size/MD5 checksum:   131680 8ae7ad06a988b72ec037bd8576a5401b

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:    57248 6ce4ddf236ef42bd67a8cbdfcd433a22
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:    91630 2351fe0384a9aacfe47d2917fad5c373
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:    86788 4f32c2829c4e067c47d2d403a7ce4f41
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:  1038730 ae7853cba7ba8f46eb0b8f02b32afc01
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:  1630072 270330a3a787ab952bb8c315bff4dea3
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:   154678 0b97726ccaf51ff69b8f29159f3def07
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:   172288 f62575c4d075147cdab3e2b3912a28d2
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_hppa.deb
    Size/MD5 checksum:    40378 7dfc68f3a0de6c6a0027cf3f82f28100

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:  1558554 20697fd1df339dfe66645e41f8fdab62
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:    53226 ed047b982bccef707582c5239e6c4529
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:    79704 defeadc51fe3b8e70c248e7f7cd78eeb
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:    87582 82b5f9adc2612c3d3818d9ee619e98c2
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:   161536 cc750090dea44733d5bfa4859768fd50
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:   137800 ced35b0270e6f9576a084a848097e56c
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:   998886 599796e90c29f4adfd032f7eced8dbd6
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_i386.deb
    Size/MD5 checksum:    36234 47bd2806f7fa212153053cf58bfa7f1b

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:   192380 fac2ee8208cc62269d660293987722c4
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:    46336 537bf35bd49b91a743511ae655ea98fa
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:   106222 41d7dfbd5f5f8989c491dd7c6256d23c
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:  1773934 ed2f57b9532dfdd17a487cc794674254
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:   204566 e0b3ae3cb6dcf554600cd8a6282f31c3
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:  1109732 dc2117102927617da49909c68a4c010d
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:   107490 e755ddc16e79d95f5e717cdda6b8b66a
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_ia64.deb
    Size/MD5 checksum:    74382 2625f53f6a81c275e6b3600b6f83e40e

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:   158354 8c52640f70fd6bd724e48bf3aa5ddaf6
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:  1569908 6e4b324f3d4ef8630c4a8a1d8d373a10
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:  1100238 265ebdea306b57efaa192601902c6152
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:    76154 a2b996d1dced2ccf1d0b325e403ad76e
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:    57670 e7496d3c9ff40b21841004011d984ab0
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:    36110 2e6233c94a391e3c12a42fb242b90c0d
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:   150984 c4b5d5c3e84d1558a3a9779f8a44880e
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_mips.deb
    Size/MD5 checksum:    87150 252b222f10710ac818eaa39d0e62d1d0

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:   158900 8fef7b67a8b23b8410cad13581d3c87f
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:  1089172 4026204ebe8cd1e3aca31fabd5c4751d
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:    36056 72c3532a5db151edc04ddcf5230d10ae
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:  1555346 7d1c3413c07ce587bcbc6b0825b27aa1
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:    57798 e38bc41a4cee06be91e5ca90eaa834d6
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:   150896 010940ad9b6f216f58055dee0c05720e
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:    77452 1bf693a139ca808f0ddfde50daeb3951
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_mipsel.deb
    Size/MD5 checksum:    87318 e6aadf01613a8363e9a77dabda1cc7b0

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:    89456 ce774884f9f2d60d53b9738087b1997c
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:    41338 6470a2c554400bf5d76df57a10c59b1a
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:   163538 f312c95edac480e335383282e658afa4
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:  1148886 2867ed7850c711eb45802ee198667b6c
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:   136252 ead19e10b92e029542cf17b378a567fc
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:    89566 03ad548ff0f04c960eb4f242dc46251d
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:    51924 f25670cf80cd3d7558da75c315305725
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_powerpc.deb
    Size/MD5 checksum:  1584292 238dcd774ade788f8bd22094c45a1330

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:    37416 996dfcb6fb6f65d8f13b7dae44e19dcf
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:   144934 ce53888a5d6fb6546cea3a29554dc617
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:  1039580 aa0880a0c055113199e8f7c7bbdb2478
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:   167056 4a769af5c2d19121705021fa93f50754
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:  1589794 9dfd00c1deacfda509f538cee7713da4
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:    88248 1d05ee6ddb20e514e6c99fe31399f2d5
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:    52516 fb5a46492d2a20e430af75e816924b35
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_s390.deb
    Size/MD5 checksum:    82330 16608e47717961ab5ae7a00d73bed368

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:    78514 690e8cc7cc8cec06cfbff7bce25484c5
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:   994252 5085b682f7e0c7ec22be63843cd3f015
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:    51784 9bd7bf8d93316b8a59d98541101cbc73
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:   139562 c783267048e5410b6ab38dadf6b92fd7
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:    36024 29fbb1ae8a6be5647d0d1eae4dbe35aa
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:   159428 42067c27bab2c7e5dc0da63f92ce073b
  http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:  1564572 83de8732694d0cc2aa0cd70636c89917
  http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch9_sparc.deb
    Size/MD5 checksum:    85628 a06afa2268b22d071eec37a6a0f558ad

Debian (stable)
- - ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7.diff.gz
    Size/MD5 checksum:   188585 2f134119c9ab17213747ad55cd3abdf5
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz
    Size/MD5 checksum:  4796827 10efe9825c1a1dcd325be47a6cc21faf
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7.dsc
    Size/MD5 checksum:     1838 598e0194241cb4b10e6ea6264c620f11

Architecture independent packages:

  http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52150 fcd78609b6330b7cac8eebf77d90551b
  http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52148 64539574b4ba2f2bdde5cfe8a5bb404a
  http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52146 899bfa5316f20775298b3d05e2e66ce9
  http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52148 7cf6e014adbf027f70c5be49eb8ca71d
  http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52150 0d536e8ea0f7bdbebe13163779e3d4f4
  http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52158 7876f928d67e4f50f752a1af537d5d96
  http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:    52132 b55b302d127310628d5e5969828c90ba
  http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1+lenny7_all.deb
    Size/MD5 checksum:  1174986 c6fed6d41ec1e486fc11ee5a632d4fb0

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:  2100558 63e7858512acf957df56b998c2890862
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:   179252 8c451eb372aab1a00e5ab852bbb16aa1
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:   118462 891f827943c1fcd54a427bd69a5907f1
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:    37994 ce1a404f568126985fc9480e8f4d5d34
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:  1144620 3c164140815a4c6df3ddfc6ae93950b9
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:   108568 eaaf105093f5f2ec429ccdc1064b6721
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:    81502 b5437c0bf2576174a46fea03ea11a446
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_alpha.deb
    Size/MD5 checksum:   446024 53ff55379c20c80ae0a63e70f43edf7a

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:   398418 80f6b9037d8d40264bdd353c717bf316
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:  2053110 f64a171669c6f0fa931ef50a409771f0
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:   168524 713d8df4f1c3946bb40b604f49656d55
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:    61044 0aa9904819ab2da5339a5b4e28ffe59a
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:  1196946 978ae6594fb203b6d507220725854f98
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:   117084 1b712fc7ceaa991aec6066d17c3d8a03
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:    99838 13e57d407ac2bac36c7077ebb5259748
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_amd64.deb
    Size/MD5 checksum:    37148 9f2d8c0ca7a37a225d7ce1723eba3829

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:   386376 57fc5eb1b60843db37cc1560b34657ba
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:   154852 cdfe93b0117b4d7ad86e097848f56a72
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:  2059778 bc505f53c123e86f61e0208bd0a5d361
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:  1119820 b567be834797c76ffb5a664e398bc34e
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:   112910 6f17df41cbb09df50155199f9be963a6
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:    55578 f4b763671e94082fbf85803d45ecd392
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:    96992 051d9fb6750b876d06191fb7e355e9ac
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_arm.deb
    Size/MD5 checksum:    36312 166cc83ac06c835703410efd4765deab

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:    37670 81910b769bfbc1349c0b153ad9164d92
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:   157710 aca520902431f9719aa580f098a03628
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:   386566 d977a3c0fda5314a6c71484987949f73
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:   117932 ba1d3d8a1858053b0183961d82a09ebe
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:  1132990 bb1d93250d6fca508cfff4997e605040
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:    55010 447b83ce0df1e08e3cbe914981ea413d
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:  2085014 f55b91ec749afcb1379aeca406b16f8f
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_armel.deb
    Size/MD5 checksum:    98412 b7cc38ea409402878d9b2e78fd627a42

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:   119870 a9351e7030124a64654c5dbf2d748b57
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:    38172 02d9783ce625e884a7ffb5a6ea4fbdc2
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:   103156 8d7ae253b7155cc5d230f0ac7d3c88e6
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:  1138966 b46cff43879618898839dc38f8c276de
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:    63126 264faa52eb7b76b7ba3af3854f3ab6cc
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:   172700 34bf188a372a5101789842c4b2bbd5c8
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:  2119306 a5b452236f9e35cb754c76105158114b
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_hppa.deb
    Size/MD5 checksum:   409118 0b899d323223726af53c0ac7f51fb98e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:   396398 a0b5f18275849bf02dbdc626cf805c1d
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:    60438 59a35fa422c60d5adc9dff540706337a
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:  1095692 fc5f6cc06799f5c00c943f9379db64be
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:    99362 39bcf5f4db639ccd311870d9e90e7545
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:    36492 febb3dc6f35605754664c84f0681cdd1
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:   165512 f063ca52a622599e17be45bfda802830
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:  2057466 86304106605edfb61db25d14a74429ea
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_i386.deb
    Size/MD5 checksum:   114902 954a28c392b37ded2ffc21bab16efaab

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:   139092 9d9f826faf7a99009aafb25c7deb637e
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:   123498 9377b05d42466021c1420362d3bb0157
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:   447534 783bb7f09f0dd7ebb82b168285ed3d2c
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:  2283614 8c700df25e12cb4ac24d5884a77e8cef
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:  1150652 e89ea87fa2fa750cf7385ef3f8efc9e5
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:    86010 db2d06c843ddfdc86d75eaa6c8f07248
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:   209138 4fbbef77787d20f8c7f828a02a504757
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_ia64.deb
    Size/MD5 checksum:    41290 854227929b82c27f1645f401ddd2ea08

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:  2049028 ba814726491cf18adc33b978cdf41ebf
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:   157944 2f2a6f1e03a329dd9bfe66aefc042e78
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:   405610 0d67a4c1476444a5bb7da06f04b0fe1a
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:  1172578 d4329dafd5542e0128668a590898fb2e
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:   108484 9a4fcffe8fdaf374474c5ea0c8d7c8f5
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:    98750 51447de9ba4558914df798f65058b6c9
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:    65290 7879c6993282cc2cc1efb3d5872b06b8
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_mips.deb
    Size/MD5 checksum:    36010 d670bc2bd607cc2625d4011fc8af900e

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:  1158288 d8b64c43ee3f0e59cc31660873f1834e
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:   158360 8197e028f08047fda6557b6b6fc9d3f3
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:    65214 715dcb4022b19252c1eea1b784884310
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:    36160 c94fe31c9b1e23e5753806cf033bf34f
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:    98910 2da6b027dc7b588830d98e798f784f0b
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:  2030054 28c9e99b851466e97e50c5712fe3342f
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:   403242 f8b494cf670baee9b65c8e6cc39080d4
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_mipsel.deb
    Size/MD5 checksum:   109970 bf6fc87864ec7230506e5fd7c7abcd8b

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:   136082 318d392ca604759afb280639cac8b03c
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:    61152 985c626435a88fd3446dc88a447d2c9b
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:   174320 57e2e7b2e6fd39ad63a1ba17e7194f40
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:   394250 fde0e239f7e24e2ba4ee42e6596c60ba
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:   104862 51a12f1bb7a775ddca43c10945639dfb
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:    44204 f285bf023a4680b7da64118d586e1d5e
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:  2124674 d8c9de7eef052dd764d66188837d86c9
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_powerpc.deb
    Size/MD5 checksum:  1191028 1b4729142f6cdda734027dda48752afd

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:   171654 0d53ed748c513498f55341ba19cfde32
  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:  2092930 7aef582c65b9873a66cd3e632acbec6e
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:  1190710 884a98297180cc5c5bace0204ac48148
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:   118578 9ec07d8c2bdc5a9645d6d32c460357e7
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:    60714 a37d661adbf755636f2b1f9340d4a96a
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:   101620 bb3e1691cf3fa70e880823db340aa835
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:    37804 5d817c9fa3eb1ebea486d0f0244384a5
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_s390.deb
    Size/MD5 checksum:   399768 b1bdeedfe5bfe453de5ee9f065f169bf

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:  2067200 1b832d51127c5a3cdf1d2f9f15fbbc9f
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:    57760 9be4f682c78cce9c7d0e80a5d6ed3f61
  http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:  1049966 1c15bf61b0f26558c8d3eb49a8aaf682
  http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:   160982 6eda428d97d49e0b90d143599ac019f5
  http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:    97212 d57b0db0765d63f354d44a3aa4799f56
  http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:   392614 124cc14e2eeceea46a513424d40860f5
  http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:    38826 ae41ac61dab018ddb25f84f517076d3e
  http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny7_sparc.deb
    Size/MD5 checksum:   116488 a91a68f4eaaf11f8666f0d07da26bf23


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkr40h0ACgkQ62zWxYk/rQcmrQCfT/1a/+FSdezaW1pc/iHM/jLN
jrgAoI1qnCASB/CO/zVZea8yTWpEXuc+
=mK8e
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFK+OBYNVH5XJJInbgRApilAJsGFnh/Y1QrhYn1QZrBiahBIWrHSgCeJYL6
+HWd/VxPdmYl+HcR0pQOVpk=
=vsqz
-----END PGP SIGNATURE-----