Date: 10 November 2004
References: ESB-2004.0793
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2004.0716 -- Two Debian Advisories - DSA 589-1 and DSA 591-1
New libgd1 and libgd2 fix arbitrary code execution
10 November 2004
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libgd1
libgd2
Publisher: Debian
Operating System: Debian GNU/Linux 3.0
Linux variants
UNIX variants
Impact: Execute Arbitrary Code/Commands
Access: Remote/Unauthenticated
CVE Names: CAN-2004-0990
Original Bulletin: http://www.debian.org/security/2004/dsa-589
http://www.debian.org/security/2004/dsa-591
- --------------------------BEGIN INCLUDED TEXT--------------------
Package : libgd and libgd2
Vulnerability : integer overflows
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0990
BugTraq ID : 11523
"infamous41md" discovered several integer overflows in the PNG image
decoding routines of the GD graphics library. This could lead to the
execution of arbitrary code on the victim's machine.
For the stable distribution (woody) these problems have been fixed in
version 1.8.4-17.woody3 of libgd1 and in version 2.0.1-10woody1 of
libgd2.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you upgrade your libgd packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
updated libgd1 packages
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libg/libgd/libgd_1.8.4-17.woody3.dsc
Size/MD5 checksum: 707 475a021c51d4a13211a211c17b1551f6
http://security.debian.org/pool/updates/main/libg/libgd/libgd_1.8.4-17.woody3.diff.gz
Size/MD5 checksum: 8695 d208e651d9d7eef22fcfd27455335c26
http://security.debian.org/pool/updates/main/libg/libgd/libgd_1.8.4.orig.tar.gz
Size/MD5 checksum: 559248 813625508e31f5c205904a305bdc8669
Alpha architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_alpha.deb
Size/MD5 checksum: 134716 18f7bb31f9c2df1876fcd43ee07cb317
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_alpha.deb
Size/MD5 checksum: 133308 800918d9a4c773155bdc1328f8e46119
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_alpha.deb
Size/MD5 checksum: 111812 6ac46129674d4377a65140a26c320f3b
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_alpha.deb
Size/MD5 checksum: 111188 53f277a1a0b1cd239a42e2f3e9558338
ARM architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_arm.deb
Size/MD5 checksum: 123676 b73ca28de04f8eff9f2f2dc6200ae089
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_arm.deb
Size/MD5 checksum: 123162 2616147546687bef695eaecbe87cd5da
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_arm.deb
Size/MD5 checksum: 104214 ad6dfb3a678252b8aea3f1e942ed9e18
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_arm.deb
Size/MD5 checksum: 103616 b5ed245e0b10ce9248c69a362c0023f4
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_i386.deb
Size/MD5 checksum: 121132 5531183a357e500c3ec58f094caf6c89
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_i386.deb
Size/MD5 checksum: 120650 73aa302b99d761988c6be28a0b6a866a
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_i386.deb
Size/MD5 checksum: 104058 f2f25e0c784aa732d5f3a6941faf8d5e
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_i386.deb
Size/MD5 checksum: 103526 b315185c17011b5b061b2f660962c04d
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_ia64.deb
Size/MD5 checksum: 145576 57beb3ee63cfc0b0f959d8fe28ee73d8
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_ia64.deb
Size/MD5 checksum: 144628 c5f3fc093c8f8b8ee02cbc4a434e072a
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_ia64.deb
Size/MD5 checksum: 125622 59b992afcbfd47d9cf36a27e9e505472
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_ia64.deb
Size/MD5 checksum: 124316 c506be2df33949840ab704c988509975
HP Precision architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_hppa.deb
Size/MD5 checksum: 132100 6058fb1f80653f72e0adbce6fcfcb453
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_hppa.deb
Size/MD5 checksum: 131300 eb08f0d6d0624e61f73315a4bf577a72
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_hppa.deb
Size/MD5 checksum: 111508 7a64ea78b91c49de452ae08ad13508d5
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_hppa.deb
Size/MD5 checksum: 110998 36efa25648536b0fc132ef8979dced21
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_m68k.deb
Size/MD5 checksum: 119284 c82fb2b6d484d42a97c9f0449492ae39
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_m68k.deb
Size/MD5 checksum: 118738 5409641a546bcc32425186e2c08460d7
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_m68k.deb
Size/MD5 checksum: 102364 8df32eaca36695c625a640aa24c13bce
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_m68k.deb
Size/MD5 checksum: 101906 e031bade76cf4ec424ba1e43f435b3fe
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_mips.deb
Size/MD5 checksum: 128900 9aa4a7d18cf202a32be6769266eafb27
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_mips.deb
Size/MD5 checksum: 128158 25a50011dde812a6850fbccb75aff32e
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_mips.deb
Size/MD5 checksum: 106426 f4cf28af2cb5191c7d352ead07184fea
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_mips.deb
Size/MD5 checksum: 105842 2132ce70ebf0c291b0b407ff73cea032
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_mipsel.deb
Size/MD5 checksum: 129090 73d06a669f116d6a748578995daff5e1
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_mipsel.deb
Size/MD5 checksum: 128270 32154086e87ddd24867be3ba9b95ecc5
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_mipsel.deb
Size/MD5 checksum: 106432 ed6fdd0570066c23e49c5da15d358aa8
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_mipsel.deb
Size/MD5 checksum: 105872 ff5c9599e2bece96cd180b5a622f6bf7
PowerPC architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_powerpc.deb
Size/MD5 checksum: 126418 406865e1b60c2c1d608b11f713a60db5
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_powerpc.deb
Size/MD5 checksum: 125524 ab9460c78e7ae3ccfcddfbbd8c842cce
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_powerpc.deb
Size/MD5 checksum: 106928 185e67aa0ac4eda2b06c6033f4faf6b3
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_powerpc.deb
Size/MD5 checksum: 106400 b1520aac55563125eb3abad8866c28a4
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_s390.deb
Size/MD5 checksum: 122502 13b4f35fd483d9503cb31f00907e3e41
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_s390.deb
Size/MD5 checksum: 121956 b81e27b20483ed0a4da783867fbcf7b5
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_s390.deb
Size/MD5 checksum: 106278 e7ebafa88cb575404ee952ca8a515423
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_s390.deb
Size/MD5 checksum: 105686 152394d7f0ff8c6d42f9eb0d80fe7c21
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libg/libgd/libgd-dev_1.8.4-17.woody3_sparc.deb
Size/MD5 checksum: 123342 ae43cdd72272edac59d42717c4892024
http://security.debian.org/pool/updates/main/libg/libgd/libgd-noxpm-dev_1.8.4-17.woody3_sparc.deb
Size/MD5 checksum: 122820 ac87eae8ec44e4efb5ed241dc74b2b76
http://security.debian.org/pool/updates/main/libg/libgd/libgd1_1.8.4-17.woody3_sparc.deb
Size/MD5 checksum: 104754 3d712ec702de16480f53424644ec78cd
http://security.debian.org/pool/updates/main/libg/libgd/libgd1-noxpm_1.8.4-17.woody3_sparc.deb
Size/MD5 checksum: 104506 34360c4b52b08560e17af05c557c2fbe
updated libgd2 packages
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1.dsc
Size/MD5 checksum: 705 88c7efa97eeab7a6eadeb620bd09188e
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1.diff.gz
Size/MD5 checksum: 8303 d7cba99b80f5d24d7925690d1cd64d3b
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1.orig.tar.gz
Size/MD5 checksum: 436945 43af994a97f3300a1165ca4888176ece
Alpha architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_alpha.deb
Size/MD5 checksum: 19426 6a129f7af61c4c89d9f8a479efb1aa80
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_alpha.deb
Size/MD5 checksum: 133708 d6bef2d604d1399f76c86988a28b2c2f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_alpha.deb
Size/MD5 checksum: 161450 8c3a8019e562585656dbc4ab1e0f9ef1
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_alpha.deb
Size/MD5 checksum: 133038 8ff0de6efe179744247ec3755a199068
ARM architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_arm.deb
Size/MD5 checksum: 16494 b8761b5ef00d2e2fdc0a12bd5ba64935
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_arm.deb
Size/MD5 checksum: 122794 4133503e81fa4009e1112c3972d3345c
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_arm.deb
Size/MD5 checksum: 149662 0452e1f7012f5337a04ddb110ca9601d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_arm.deb
Size/MD5 checksum: 122106 21ebf1c6a9c99a654aeda3dc2de8ae61
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_i386.deb
Size/MD5 checksum: 16360 ba3066520359c3291d225c3587467b47
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_i386.deb
Size/MD5 checksum: 122538 eef089742b45329d6eee1b4b8e3d32a3
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_i386.deb
Size/MD5 checksum: 144380 f04b92dfa62c680420c0bc2427e77d0d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_i386.deb
Size/MD5 checksum: 121988 8401ad37f2301fb537fb021f248007e3
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_ia64.deb
Size/MD5 checksum: 19686 6c3c9b03041462cd524ac5a9f136615e
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_ia64.deb
Size/MD5 checksum: 150808 515e12b09662de87d49b6f35acae1ebb
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_ia64.deb
Size/MD5 checksum: 176490 99c2709b91b19847a5464a43da387f82
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_ia64.deb
Size/MD5 checksum: 149940 2e4ddcf1e74e5a4d6290c05c1ab12c14
HP Precision architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_hppa.deb
Size/MD5 checksum: 17560 c8007c9d34777006a64484d4c6e7a93f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_hppa.deb
Size/MD5 checksum: 133764 02776aee09b0c637d657f72ef25da6e3
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_hppa.deb
Size/MD5 checksum: 158148 79cad220b411030e9ae73b6cc571b4d0
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_hppa.deb
Size/MD5 checksum: 133214 db7f30c855c7c081086ef0ca087b167e
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_m68k.deb
Size/MD5 checksum: 16254 d68b2a04ef57a8d3d796ddf4a87cfacb
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_m68k.deb
Size/MD5 checksum: 119546 6d2f5b67232dceb02e05e1c023b4c63f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_m68k.deb
Size/MD5 checksum: 141400 b2ed3350229ad3c3e3355dd96e68cc75
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_m68k.deb
Size/MD5 checksum: 118992 b6bfe3a735b1d923d0bc57dde4b915c7
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_mips.deb
Size/MD5 checksum: 16254 a50a60c6911d92ba9a0515e87aaaa325
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_mips.deb
Size/MD5 checksum: 125870 189dd85190eb1f3b804762602793fa92
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_mips.deb
Size/MD5 checksum: 155372 1d343ea6008b1325abc5695f2c040280
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_mips.deb
Size/MD5 checksum: 125226 ad9fc8b3e7d1991168ef898bbb3a2544
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_mipsel.deb
Size/MD5 checksum: 16178 7291e8074a031d4245f321084d4277aa
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_mipsel.deb
Size/MD5 checksum: 126100 14c4f2f1d9d3fb1b555ec9b1f0745e5a
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_mipsel.deb
Size/MD5 checksum: 155530 3ffae465699cb6775927c05daef6785d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_mipsel.deb
Size/MD5 checksum: 125470 bd3d389629412e2e5860f4a0d5c4fc33
PowerPC architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_powerpc.deb
Size/MD5 checksum: 16684 abae7aecfede1fba89c55541db9621f0
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_powerpc.deb
Size/MD5 checksum: 126232 5f4ac8d84d3e1957243ef904fd9460af
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_powerpc.deb
Size/MD5 checksum: 152194 2ff1c73c04e079cd3c048a3fe0c76b62
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_powerpc.deb
Size/MD5 checksum: 125536 7d03001e0fbefdd8481e8aa8ebd8f1d5
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_s390.deb
Size/MD5 checksum: 17526 c6d969e33155948d6fe20b6faa467505
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_s390.deb
Size/MD5 checksum: 125972 e792ef4f6ca004f73a4c5e239525c456
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_s390.deb
Size/MD5 checksum: 146656 50536238baf45e02b4d0efee67e23716
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_s390.deb
Size/MD5 checksum: 125356 4688d47c735283c8974c6306aac76cdc
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.1-10woody1_sparc.deb
Size/MD5 checksum: 16622 dad3372d7766abd0bf6936364c867c33
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.1-10woody1_sparc.deb
Size/MD5 checksum: 124496 2736df53b6305853b8c3e81a31804375
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.1-10woody1_sparc.deb
Size/MD5 checksum: 148200 e390b00feeee0a027c7f5828660fecdf
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.1-10woody1_sparc.deb
Size/MD5 checksum: 123890 b7339c8e4a801dd2dbb81cae06b8e236
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQZFk0yh9+71yA2DNAQKftgP7Bu6WGr86X20FK3HINi4iCEsrOhw5MkIT
rfUxAjwfOS0ppqm9vdfnPqplykcaOYUYneFHOhnlJLs/pckJtW4qsUmOwOljncm/
ZmPKyvPI4J32oqbTqzuzPvdhqB0Vc3CcwxMJOg1JZdzyiSYe23OsXO+KA4PgmFvt
haW4gTqy1Yw=
=vZJl
-----END PGP SIGNATURE-----
|