Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3135 java-1.7.1-ibm security update 16 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: java-1.7.1-ibm Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-11775 CVE-2019-7317 CVE-2019-2816 CVE-2019-2769 CVE-2019-2762 Reference: ASB-2019.0212 ESB-2019.2747 ESB-2019.2729 ESB-2019.1454 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:2494 https://access.redhat.com/errata/RHSA-2019:2495 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.1-ibm security update Advisory ID: RHSA-2019:2494-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2019:2494 Issue date: 2019-08-15 CVE Names: CVE-2019-2762 CVE-2019-2769 CVE-2019-2816 CVE-2019-7317 CVE-2019-11775 ===================================================================== 1. Summary: An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP50. Security Fix(es): * IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1672409 - CVE-2019-7317 libpng: use-after-free in png_image_free in png.c 1730056 - CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) 1730099 - CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518) 1730415 - CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) 1738549 - CVE-2019-11775 IBM JDK: Failure to privatize a value pulled out of the loop by versioning 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.i686.rpm ppc64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.ppc64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.ppc64.rpm s390x: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.s390x.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.s390x.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.s390x.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.i686.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-2762 https://access.redhat.com/security/cve/CVE-2019-2769 https://access.redhat.com/security/cve/CVE-2019-2816 https://access.redhat.com/security/cve/CVE-2019-7317 https://access.redhat.com/security/cve/CVE-2019-11775 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXVUgBtzjgjWX9erEAQg5bBAAjPXukMp83HTw0k3xseyBEklamYSAD5Hq 1Tidly9WGIiIjToZiswjUMGhuxjh9V0aUSXQaytgn7GLT/Hgh2ztFsLs039Nc2cw AJnap7mpzuLwmWTASHHoLlYcciLHgkj/mdhOVOn4yrLNtMnRklv7NsBlNZgkrjBn cYCz8ojE6Fc1BGzSYQBjHWRi0s6BCYfAY01ACgzAPIeRdp4JSzr6RUeuXP/wkAOM KRKhhEF/RvrWutEIzJ9x4U0Sg7VpIDX3lyQohNRr7zn54GUxA8FfXSWb2JDs2Sjg 5YNq1YBAAB0oATXXNOkeykU7V29PRqe3LDHJZmK2oetXC2bke5HAZZ+VwuARYAjO RxyWEjz2zWCNlpsfMLq1dMDHDxV3vedjJxStQMlGLfNiPg0NomNe2YZEM1larzt5 zeGip7CO8AhgUAVwVID/102Ep96hDP2n9O0Hp20JN1/GispwhOnUeOHAKt8NoIzX /f4G/4qkNt9UmYjbaHjpM1dz6Wmqz5vxd4jzCJTKmfwZCJ29Xbsd4vPB5xV5412R ltG/KuRrfWpz8oee1GkPY/DwmLErbr0dsayudJRc8R/jIAQRcG2UdsIR8kR298ek FLsIZ6fzAE7Jjo883bG2chDsJ4xZ5lSuicehjke1PM4/a4dpMyxfVSu/esdSlx70 7VEaYReI+qw= =LwYT - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.1-ibm security update Advisory ID: RHSA-2019:2495-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2019:2495 Issue date: 2019-08-15 CVE Names: CVE-2019-2762 CVE-2019-2769 CVE-2019-2816 CVE-2019-7317 CVE-2019-11775 ===================================================================== 1. Summary: An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP50. Security Fix(es): * IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1672409 - CVE-2019-7317 libpng: use-after-free in png_image_free in png.c 1730056 - CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) 1730099 - CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518) 1730415 - CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) 1738549 - CVE-2019-11775 IBM JDK: Failure to privatize a value pulled out of the loop by versioning 6. Package List: Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.ppc64.rpm ppc64le: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm s390x: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-2762 https://access.redhat.com/security/cve/CVE-2019-2769 https://access.redhat.com/security/cve/CVE-2019-2816 https://access.redhat.com/security/cve/CVE-2019-7317 https://access.redhat.com/security/cve/CVE-2019-11775 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXVUfj9zjgjWX9erEAQgHKg/+JGYAGvI9M07jVnyx/aVilNzoHRbbyA9k ZOdfkTRvXD3Einlrwpe0NV6UPygQ6kiLGE1YdlO3LluoLJupasBXpgCKCeSee/bN Ie1mLvXswfzOzGLIHGTeY7bSTGgjP99+7GzTrpKSbf3wl8LGAdx42EJ0ecIMUIyQ E0YpbV9h6M77ItWpeI88aIy6n74xu40kkZA3GupPQxBVfFJlkMJgwOdE4Nwi1b50 48f0UjQkxZ6bl0imx+rUoboCbgH2iohf45GmLqF0OgwDUeq0MkXYARXkqzaA7NOU ADwFxOFcj0SJ7LJXjFRQa9i+D2KKRHbXTmn/PaXnM6J6BEycsFfwLXnqVqdrTUtb RJ00k4yPMjADkmTuwdS0GNL9wa0YWtBja1By2n+S49AbA36CysmuVAAMfq5JYnHB 5F2IqlnQvu6EZl84psq692WWKZPiBzgvSVTfi0+VNPyN9Omsn85/sw2wkXMvPMJZ DAeRLKKgoWMv8bNzOAd9rvO/z6DO6fYKSygFsMN6f2vfG61KuHnD/n2uot929/G8 4vPqxTcVMvUjXjPNqZtMXJpmqV/m0OjzzfbEFzLNlHnMNvkzLiMH3MJxZ+SaL0uU Y8uI6vVttVB37hjkZAA/+cK753smTsFa+Ol54Wl8ULei4tRGdHc7hGII/9nL5OTr 7J6ryPGM2HA= =nXZW - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXVX8AmaOgq3Tt24GAQjiNhAAwJ1xmVXVBOG4BVh1HrIMUo702eZ3XSKt u+/TeW5KDodGMz5aLZC00P8MD8RCUhTWfazuArWOBGkXvchw7PSlLfKBAH8paE+m V6nE6kkY6HiIbvtoKgPQ6zjP9bOacjqiDkhwg0ddRtZTJJT0cQpw7Ps54YPltwo6 3SNgbI67+cRyJwbfXndcN2SwJjufIk707J3888bRSflGjL79ajf3YBLeVjx6Aq1T EefLQ5ipKTqlTPfwYAlG7+VLzaODepLtuNVTHIRd/CKKmByaGbjY1YadSiIpVu2l mQ960x4+7lVwsiEF7e2HunO9fCH66226RqA24wnoN4DEbW79nnCUI5Tug0pjYA9i yVed/oRqFDKl/KkYHr9a6TWxxNn1bVnq5tkgve7daacSnksQMIF6BRlXlGw62dvL qrUAhvyxWdTLMm94jLtEy7mw/5bKZu1e4zVpXWYqFtVujKk+M/zD77wQIXe6EDEg Z1dTwGJCt3C8OJvZ8e0exEGnw/nmiKrWAQHf6csS9A/NFKm0KwopSBtmWyliiUvV i8sjUrWroXUlyaMTxtmY6ZyMJ3RnH647sS30+cPNIwC+AJGCDWs1+gG8e/Jx9WU6 4yARCPpbZi5gm3uMEgHvGoMuM0DmD+Yd9mgTBSzVmql9NcgavcVblSMOes5MlGZo BHx6xCqHfuw= =Pj+R -----END PGP SIGNATURE-----