Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.4961 SVD-2023-0808: August Third Party Package Updates in Splunk Enterprise 31 August 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Splunk Enterprise Publisher: Splunk Operating System: UNIX variants (UNIX, Linux, OSX) Windows Resolution: Patch/Upgrade CVE Names: CVE-2023-29405 CVE-2023-29404 CVE-2023-29403 CVE-2023-29402 CVE-2023-29400 CVE-2023-27538 CVE-2023-27537 CVE-2023-27536 CVE-2023-27535 CVE-2023-27534 CVE-2023-27533 CVE-2023-24540 CVE-2023-24539 CVE-2023-23916 CVE-2023-23915 CVE-2023-23914 CVE-2022-46175 CVE-2022-43552 CVE-2022-43551 CVE-2022-42916 CVE-2022-42915 CVE-2022-42004 CVE-2022-42003 CVE-2022-41722 CVE-2022-41720 CVE-2022-41716 CVE-2022-41715 CVE-2022-40899 CVE-2022-40897 CVE-2022-40023 CVE-2022-38900 CVE-2022-37603 CVE-2022-37601 CVE-2022-37599 CVE-2022-36227 CVE-2022-35737 CVE-2022-35260 CVE-2022-35252 CVE-2022-33987 CVE-2022-32221 CVE-2022-32208 CVE-2022-32207 CVE-2022-32206 CVE-2022-32205 CVE-2022-32189 CVE-2022-32149 CVE-2022-32148 CVE-2022-31129 CVE-2022-30635 CVE-2022-30634 CVE-2022-30633 CVE-2022-30632 CVE-2022-30631 CVE-2022-30630 CVE-2022-30629 CVE-2022-30580 CVE-2022-30115 CVE-2022-29804 CVE-2022-29526 CVE-2022-28327 CVE-2022-28131 CVE-2022-27782 CVE-2022-27781 CVE-2022-27780 CVE-2022-27779 CVE-2022-27778 CVE-2022-27776 CVE-2022-27775 CVE-2022-27774 CVE-2022-27664 CVE-2022-27536 CVE-2022-27191 CVE-2022-25881 CVE-2022-24999 CVE-2022-24921 CVE-2022-24675 CVE-2022-23806 CVE-2022-23773 CVE-2022-23772 CVE-2022-23491 CVE-2022-22576 CVE-2022-3517 CVE-2022-3510 CVE-2022-3509 CVE-2022-3171 CVE-2022-2880 CVE-2022-2879 CVE-2022-2309 CVE-2022-1962 CVE-2022-1941 CVE-2022-1705 CVE-2021-44717 CVE-2021-44716 CVE-2021-43565 CVE-2021-41772 CVE-2021-41771 CVE-2021-41184 CVE-2021-41183 CVE-2021-41182 CVE-2021-39293 CVE-2021-38561 CVE-2021-38297 CVE-2021-36976 CVE-2021-36221 CVE-2021-34558 CVE-2021-33198 CVE-2021-33197 CVE-2021-33196 CVE-2021-33195 CVE-2021-33194 CVE-2021-31566 CVE-2021-31525 CVE-2021-29923 CVE-2021-29425 CVE-2021-29060 CVE-2021-27919 CVE-2021-27918 CVE-2021-23382 CVE-2021-23343 CVE-2021-22947 CVE-2021-22946 CVE-2021-22945 CVE-2021-22926 CVE-2021-22925 CVE-2021-22924 CVE-2021-22923 CVE-2021-22922 CVE-2021-22901 CVE-2021-22898 CVE-2021-22897 CVE-2021-22890 CVE-2021-22876 CVE-2021-22569 CVE-2021-20066 CVE-2021-3803 CVE-2021-3572 CVE-2021-3520 CVE-2020-29652 CVE-2020-28851 CVE-2020-28469 CVE-2020-14155 CVE-2020-8908 CVE-2020-8286 CVE-2020-8285 CVE-2020-8284 CVE-2020-8231 CVE-2020-8177 CVE-2020-8169 CVE-2019-20838 CVE-2019-20454 CVE-2018-20225 CVE-2018-10237 CVE-2013-7489 Original Bulletin: https://advisory.splunk.com//advisories/SVD-2023-0808 Comment: CVSS (Max): 9.8 CVE-2023-29405 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: [NIST], GitHub, Google Inc. Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- August Third Party Package Updates in Splunk Enterprise Advisory ID: SVD-2023-0808 CVE ID: Multiple Published: 2023-08-30 Last Update: 2023-08-30 Description Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in Splunk Enterprise, including the folLowing: CVE Package Remediation Severity CVE-2022-38900 decode-uri-component Upgraded to 6.0.0 High CVE-2022-33987 got Upgraded to 12.5.3 Medium CVE-2022-37601 loader-utils Upgraded to 1.4.2 Critical CVE-2021-23382 postcss Upgraded to 7.0.37 High CVE-2021-29060 color-string Upgraded to 1.5.5 Medium CVE-2022-38900 decode-uri-component Upgraded to 0.2.1 High CVE-2020-28469 glob-parent Upgraded to 5.1.2 High CVE-2022-37599 loader-utils Upgraded to 2.0.4 High CVE-2022-37601 loader-utils Upgraded to 2.0.4 Critical CVE-2022-37603 loader-utils Upgraded to 2.0.4 High CVE-2022-3517 minimatch Upgraded to 3.0.5 High CVE-2022-31129 moment Upgraded to 2.29.4 High CVE-2021-3803 nth-check Upgraded to 2.0.1 High CVE-2021-23343 path-parse Upgraded to 1.0.7 High CVE-2022-24999 qs Upgraded to 6.5.3 High CVE-2023-27538 curl Upgraded to 8.0.1 Medium CVE-2023-27537 curl Upgraded to 8.0.1 Medium CVE-2023-27536 curl Upgraded to 8.0.1 Medium CVE-2023-27535 curl Upgraded to 8.0.1 Medium CVE-2023-27534 curl Upgraded to 8.0.1 High CVE-2023-27533 curl Upgraded to 8.0.1 High CVE-2023-23916 curl Upgraded to 8.0.1 Medium CVE-2023-23915 curl Upgraded to 8.0.1 Medium CVE-2023-23914 curl Upgraded to 8.0.1 Critical CVE-2022-43552 curl Upgraded to 8.0.1 Medium CVE-2022-43551 curl Upgraded to 8.0.1 High CVE-2022-42916 curl Upgraded to 8.0.1 High CVE-2022-42915 curl Upgraded to 8.0.1 High CVE-2022-35260 curl Upgraded to 8.0.1 Medium CVE-2022-32221 curl Upgraded to 8.0.1 Critical CVE-2022-35252 curl Upgraded to 8.0.1 Low CVE-2022-32208 curl Upgraded to 8.0.1 Medium CVE-2022-32207 curl Upgraded to 8.0.1 Critical CVE-2022-32206 curl Upgraded to 8.0.1 Medium CVE-2022-32205 curl Upgraded to 8.0.1 Medium CVE-2022-30115 curl Upgraded to 8.0.1 Medium CVE-2022-27782 curl Upgraded to 8.0.1 High CVE-2022-27781 curl Upgraded to 8.0.1 High CVE-2022-27780 curl Upgraded to 8.0.1 High CVE-2022-27779 curl Upgraded to 8.0.1 Medium CVE-2022-27778 curl Upgraded to 8.0.1 High CVE-2022-27776 curl Upgraded to 8.0.1 Medium CVE-2022-27775 curl Upgraded to 8.0.1 High CVE-2022-27774 curl Upgraded to 8.0.1 Medium CVE-2022-22576 curl Upgraded to 8.0.1 High CVE-2021-22947 curl Upgraded to 8.0.1 Medium CVE-2021-22946 curl Upgraded to 8.0.1 High CVE-2021-22945 curl Upgraded to 8.0.1 Critical CVE-2021-22926 curl Upgraded to 8.0.1 High CVE-2021-22925 curl Upgraded to 8.0.1 Medium CVE-2021-22924 curl Upgraded to 8.0.1 Low CVE-2021-22923 curl Upgraded to 8.0.1 Medium CVE-2021-22922 curl Upgraded to 8.0.1 Medium CVE-2021-22901 curl Upgraded to 8.0.1 High CVE-2021-22898 curl Upgraded to 8.0.1 Low CVE-2021-22897 curl Upgraded to 8.0.1 Medium CVE-2021-22890 curl Upgraded to 8.0.1 Low CVE-2021-22876 curl Upgraded to 8.0.1 Medium CVE-2020-8286 curl Upgraded to 8.0.1 High CVE-2020-8285 curl Upgraded to 8.0.1 High CVE-2020-8284 curl Upgraded to 8.0.1 Low CVE-2020-8231 curl Upgraded to 8.0.1 High CVE-2020-8177 curl Upgraded to 8.0.1 High CVE-2020-8169 curl Upgraded to 8.0.1 High CVE-2022-29804 go Upgraded to 1.19.8 High CVE-2022-32189 go Upgraded to 1.19.8 High CVE-2022-32148 go Upgraded to 1.19.8 Medium CVE-2022-30635 go Upgraded to 1.19.8 High CVE-2022-30633 go Upgraded to 1.19.8 High CVE-2022-30632 go Upgraded to 1.19.8 High CVE-2022-30631 go Upgraded to 1.19.8 High CVE-2022-30630 go Upgraded to 1.19.8 High CVE-2022-30629 go Upgraded to 1.19.8 Low CVE-2022-30580 go Upgraded to 1.19.8 High CVE-2022-28131 go Upgraded to 1.19.8 High CVE-2022-1962 go Upgraded to 1.19.8 Medium CVE-2022-1705 go Upgraded to 1.19.8 Medium CVE-2022-30634 go Upgraded to 1.19.8 High CVE-2022-29526 go Upgraded to 1.19.8 Medium CVE-2022-28327 go Upgraded to 1.19.8 High CVE-2022-24675 go Upgraded to 1.19.8 High CVE-2022-27191 go Upgraded to 1.19.8 High CVE-2022-24921 go Upgraded to 1.19.8 High CVE-2022-23806 go Upgraded to 1.19.8 Critical CVE-2022-23773 go Upgraded to 1.19.8 High CVE-2022-23772 go Upgraded to 1.19.8 High CVE-2021-39293 go Upgraded to 1.19.8 High CVE-2021-44716 go Upgraded to 1.19.8 High CVE-2021-44717 go Upgraded to 1.19.8 Medium CVE-2021-41772 go Upgraded to 1.19.8 High CVE-2021-41771 go Upgraded to 1.19.8 High CVE-2021-38297 go Upgraded to 1.19.8 Critical CVE-2021-36221 go Upgraded to 1.19.8 Medium CVE-2021-29923 go Upgraded to 1.19.8 High CVE-2021-33198 go Upgraded to 1.19.8 High CVE-2021-33197 go Upgraded to 1.19.8 Medium CVE-2021-33196 go Upgraded to 1.19.8 High CVE-2021-33195 go Upgraded to 1.19.8 High CVE-2021-34558 go Upgraded to 1.19.8 Medium CVE-2021-31525 go Upgraded to 1.19.8 Medium CVE-2021-33194 go Upgraded to 1.19.8 High CVE-2021-27919 go Upgraded to 1.19.8 Medium CVE-2021-27918 go Upgraded to 1.19.8 High CVE-2022-29804 go Upgraded to 1.19.8 High CVE-2022-32189 go Upgraded to 1.19.8 High CVE-2022-32148 go Upgraded to 1.19.8 Medium CVE-2022-30635 go Upgraded to 1.19.8 High CVE-2022-30633 go Upgraded to 1.19.8 High CVE-2022-30632 go Upgraded to 1.19.8 High CVE-2022-30631 go Upgraded to 1.19.8 High CVE-2022-30630 go Upgraded to 1.19.8 High CVE-2022-30629 go Upgraded to 1.19.8 Low CVE-2022-30580 go Upgraded to 1.19.8 High CVE-2022-28131 go Upgraded to 1.19.8 High CVE-2022-1962 go Upgraded to 1.19.8 Medium CVE-2022-1705 go Upgraded to 1.19.8 Medium CVE-2022-30634 go Upgraded to 1.19.8 High CVE-2022-29526 go Upgraded to 1.19.8 Medium CVE-2022-28327 go Upgraded to 1.19.8 High CVE-2022-24675 go Upgraded to 1.19.8 High CVE-2022-27191 go Upgraded to 1.19.8 High CVE-2022-24921 go Upgraded to 1.19.8 High CVE-2022-23806 go Upgraded to 1.19.8 Critical CVE-2022-23773 go Upgraded to 1.19.8 High CVE-2022-23772 go Upgraded to 1.19.8 High CVE-2021-39293 go Upgraded to 1.19.8 High CVE-2021-44716 go Upgraded to 1.19.8 High CVE-2021-44717 go Upgraded to 1.19.8 Medium CVE-2021-41772 go Upgraded to 1.19.8 High CVE-2021-41771 go Upgraded to 1.19.8 High CVE-2021-38297 go Upgraded to 1.19.8 Critical CVE-2022-29804 go Upgraded to 1.19.8 High CVE-2022-32189 go Upgraded to 1.19.8 High CVE-2022-32148 go Upgraded to 1.19.8 Medium CVE-2022-30635 go Upgraded to 1.19.8 High CVE-2022-30633 go Upgraded to 1.19.8 High CVE-2022-30632 go Upgraded to 1.19.8 High CVE-2022-30631 go Upgraded to 1.19.8 High CVE-2022-30630 go Upgraded to 1.19.8 High CVE-2022-30629 go Upgraded to 1.19.8 Low CVE-2022-30580 go Upgraded to 1.19.8 High CVE-2022-28131 go Upgraded to 1.19.8 High CVE-2022-1962 go Upgraded to 1.19.8 Medium CVE-2022-1705 go Upgraded to 1.19.8 Medium CVE-2022-30634 go Upgraded to 1.19.8 High CVE-2022-29526 go Upgraded to 1.19.8 Medium CVE-2022-27536 go Upgraded to 1.19.8 High CVE-2022-28327 go Upgraded to 1.19.8 High CVE-2022-23806 go Upgraded to 1.2 Critical CVE-2021-38297 go Upgraded to 1.2 Critical CVE-2022-23806 go Upgraded to 1.2 Critical CVE-2022-32149 go Upgraded to 1.2 High CVE-2022-30635 go Upgraded to 1.2 High CVE-2022-23772 go Upgraded to 1.2 High CVE-2022-40023 go Upgraded to 1.2 High CVE-2022-40023 go Upgraded to 1.2 High CVE-2021-43565 go Upgraded to 1.2 High CVE-2022-30580 go Upgraded to 1.2 High CVE-2022-30580 go Upgraded to 1.2 High CVE-2022-30633 go Upgraded to 1.2 High CVE-2022-30633 go Upgraded to 1.2 High CVE-2022-28131 go Upgraded to 1.2 High CVE-2022-28131 go Upgraded to 1.2 High CVE-2022-30632 go Upgraded to 1.2 High CVE-2022-30632 go Upgraded to 1.2 High CVE-2021-38561 go Upgraded to 1.2 High CVE-2022-41716 go Upgraded to 1.2 High CVE-2022-41716 go Upgraded to 1.2 High CVE-2022-40899 go Upgraded to 1.2 High CVE-2022-28327 go Upgraded to 1.2 High CVE-2022-28327 go Upgraded to 1.2 High CVE-2022-24921 go Upgraded to 1.2 High CVE-2022-24921 go Upgraded to 1.2 High CVE-2022-30630 go Upgraded to 1.2 High CVE-2022-30630 go Upgraded to 1.2 High CVE-2022-27191 go Upgraded to 1.2 High CVE-2022-27191 go Upgraded to 1.2 High CVE-2022-42003 go Upgraded to 1.2 High CVE-2022-23773 go Upgraded to 1.2 High CVE-2022-23773 go Upgraded to 1.2 High CVE-2022-30634 go Upgraded to 1.2 High CVE-2020-29652 go Upgraded to 1.2 High CVE-2022-41715 go Upgraded to 1.2 High CVE-2022-41715 go Upgraded to 1.2 High CVE-2022-24675 go Upgraded to 1.2 High CVE-2022-24675 go Upgraded to 1.2 High CVE-2022-30634 go Upgraded to 1.2 High CVE-2022-41720 go Upgraded to 1.2 High CVE-2022-3510 go Upgraded to 1.2 High CVE-2022-27664 go Upgraded to 1.2 High CVE-2022-23491 go Upgraded to 1.2 High CVE-2022-23491 go Upgraded to 1.2 High CVE-2022-2880 go Upgraded to 1.2 High CVE-2022-2880 go Upgraded to 1.2 High CVE-2022-29804 go Upgraded to 1.2 High CVE-2022-32189 go Upgraded to 1.2 High CVE-2022-32189 go Upgraded to 1.2 High CVE-2021-39293 go Upgraded to 1.2 High CVE-2021-41772 go Upgraded to 1.2 High CVE-2022-29804 go Upgraded to 1.2 High CVE-2022-30635 go Upgraded to 1.2 High CVE-2022-23772 go Upgraded to 1.2 High CVE-2022-41720 go Upgraded to 1.2 High CVE-2022-3509 go Upgraded to 1.2 High CVE-2022-2309 go Upgraded to 1.2 High CVE-2022-30631 go Upgraded to 1.2 High CVE-2022-30631 go Upgraded to 1.2 High CVE-2018-20225 go Upgraded to 1.2 High CVE-2022-32149 go Upgraded to 1.2 High CVE-2021-43565 go Upgraded to 1.2 High CVE-2020-28851 go Upgraded to 1.2 High CVE-2022-42004 go Upgraded to 1.2 High CVE-2022-1941 go Upgraded to 1.2 High CVE-2022-3171 go Upgraded to 1.2 High CVE-2021-41771 go Upgraded to 1.2 High CVE-2022-2879 go Upgraded to 1.2 High CVE-2022-2879 go Upgraded to 1.2 High CVE-2022-1962 go Upgraded to 1.2 Medium CVE-2022-29526 go Upgraded to 1.2 Medium CVE-2021-44717 go Upgraded to 1.2 Medium CVE-2022-1705 go Upgraded to 1.2 Medium CVE-2021-22569 go Upgraded to 1.2 Medium CVE-2021-29425 go Upgraded to 1.2 Medium CVE-2022-1962 go Upgraded to 1.2 Medium CVE-2022-29526 go Upgraded to 1.2 Medium CVE-2022-1705 go Upgraded to 1.2 Medium CVE-2013-7489 go Upgraded to 1.2 Medium CVE-2022-32148 go Upgraded to 1.2 Medium CVE-2022-32148 go Upgraded to 1.2 Medium CVE-2021-20066 go Upgraded to 1.2 Medium CVE-2021-3572 go Upgraded to 1.2 Medium CVE-2018-10237 go Upgraded to 1.2 Medium CVE-2022-40897 go Upgraded to 1.2 Medium CVE-2022-30629 go Upgraded to 1.2 Low CVE-2020-8908 go Upgraded to 1.2 Low CVE-2022-30629 go Upgraded to 1.2 Low CVE-2022-41722 go Upgraded to 1.2 High CVE-2022-25881 http-cache-semantics Upgraded to 4.1.1 High CVE-2022-42003 jackson-databind Upgraded to 2.13.5 High CVE-2022-42004 jackson-databind Upgraded to 2.13.5 High CVE-2021-41182 jquery-ui Upgraded to 1.13.2 Medium CVE-2021-41183 jquery-ui Upgraded to 1.13.2 Medium CVE-2021-41184 jquery-ui Upgraded to 1.13.2 Medium CVE-2022-46175 json5 Upgraded to 1.0.2 High CVE-2022-36227 libarchive Upgraded to 3.6.2 Critical CVE-2021-31566 libarchive Upgraded to 3.6.2 High CVE-2021-36976 libarchive Upgraded to 3.6.2 Medium CVE-2021-3520 lz4 Upgraded to. 1.9.4 Critical CVE-2022-40023 mako Patched High CVE-2022-40023 mako Upgraded to 1.2.4 High CVE-2020-14155 pcre2 Upgraded to 10.40 Medium CVE-2019-20454 pcre2 Upgraded to 10.40 High CVE-2019-20838 pcre2 Upgraded to 10.40 High CVE-2022-35737 sqlite Upgraded to 3.41.2 High CVE-2023-29404 go Upgraded to 1.19.10 Critical CVE-2023-29402 go Upgraded to 1.19.10 Critical CVE-2023-24540 go Upgraded to 1.19.10 Critical CVE-2023-29405 go Upgraded to 1.19.10 Critical CVE-2023-29400 go Upgraded to 1.19.10 High CVE-2023-24539 go Upgraded to 1.19.10 High CVE-2023-29403 go Upgraded to 1.19.10 High CVE-2023-29403 go Upgraded to 1.19.10 High Solution For Splunk Enterprise, upgrade versions to 8.2.12, 9.0.6, or 9.1.1. Product Status Product Version Component Affected Version Fix Version Splunk Enterprise 8.2 - 8.2.0 to 8.2.11 8.2.12 Splunk Enterprise 9.0 - 9.0.0 to 9.0.5 9.0.6 Splunk Enterprise 9.1 - 9.1.0 9.1.1 Severity For the CVEs in this list, Splunk adopted the national vulnerability database (NVD) common vulnerability scoring system (CVSS) rating to align with industry standards. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZPAWs8kNZI30y1K9AQir0Q//a6xmD8V3mtdIc3CdnZ5OCNmEGppj0HL6 pNxRKKbgUxWghr4TuJt3Bwzi7+G3X/G7souIa66LrC3wUmKFK1JAqXq1dF4eCnUE pKkTon/RGEbXxxkdHoMkCDLNvq0yOEQNc7ZxKak7CEtQRCEEkk44vEsDcp4D0p+T ELA1P9urtWypQe82UoZFdnFBOlHifPNTp4V4EcZxfFK8V6eGNkHB5XVyA5fRbQ8x pPam6z4uW6DxJts0jXHB103Y4NRCpsc02bLp073CE9UPkyrWzviv4c6tATZopj9Y 757aGTE+Sg73tKJCrqbfr1Twl8fAyUb5o3J5dmK8K1ogZ0kv7rhG+OicZ2mxXgmY X0NjOo70brb+sngir+hdnHMqJojmWAU5mSkX2K/xaAXF0AOajYf6c6X4q7M1A9y8 xaZX6xiXueEzaDCiMHY7b/gnq56FhuyQGtBHysUIui6WEEYNvVnfbsA5J7LNTvW4 pO7ahdtKXuzoeinyhfY7l6HHs+T0UdfT+jbpmdQi63GCiGfeTxZrPwpAJ+cxAHJ+ t1Uc+LvpucS3DvFzIky64MEJKCPtJZtIuKICI7XOZ5wscIY0NQpjPkpYxMRSX+/E D6XvsoY+qc0esGaCW01Cf8C1/gQQfl41bL2XLZFe3XZC3PAYPJ1WGppuxLcWEXw+ O5M1npFwtHQ= =DEOK -----END PGP SIGNATURE-----