copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2003.0783 -- RHSA-2003:313-01 -- Updated PostgreSQL packages fix buffer overflow

Date: 14 November 2003

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2003.0783 -- RHSA-2003:313-01
              Updated PostgreSQL packages fix buffer overflow
                             14 November 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                PostgreSQL 7.2.x, 7.3.x prior to 7.3.4
Publisher:              Red Hat
Operating System:       Red Hat Linux 9
                        Red Hat Linux 8.0
                        Red Hat Linux 7.3
                        Red Hat Linux 7.2
Impact:                 Execute Arbitrary Code/Commands
Access Required:        Remote
CVE Names:              CAN-2003-0901

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated PostgreSQL packages fix buffer overflow
Advisory ID:       RHSA-2003:313-00
Issue date:        2003-11-13
Updated on:        2003-11-13
Product:           Red Hat Linux
Keywords:          
Cross references:  
Obsoletes:         RHSA-2003:001 RHSA-2003:010
CVE Names:         CAN-2003-0901
- - ---------------------------------------------------------------------

1. Topic:

Updated PostgreSQL packages that correct a buffer overflow in the to_ascii
routines are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

PostgreSQL is an advanced Object-Relational database management system
(DBMS).  

Two bugs that can lead to buffer overflows have been found in the
PostgreSQL abstract data type to ASCII conversion routines.  A remote
attacker who is able to influence the data passed to the to_ascii functions
may be able to execute arbitrary code in the context of the PostgreSQL
server.  These issues affect PostgreSQL 7.2.x, and 7.3.x before 7.3.4. 
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2003-0901 to these issues.

In addition, a bug that can lead to leaks has been found in the string to
timestamp abstract data type conversion routine.  If the input string to
the to_timestamp() routine is shorter than what the template string is
expecting, the routine will run off the end of the input string, resulting
in a leak of previous timestamp behavior and unstable behavior.

Users of PostgreSQL are advised to upgrade to these erratum packages, which
contain backported patches that correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Note that no initdb will be necessary from previous PostgreSQL packages.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

108079 - CAN-2003-0901 PostgreSQL To_Ascii() Buffer Overflow Vulnerability
109068 - to_timestamp not stable if date string shorter than template

6. RPMs required:

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/postgresql-7.1.3-5.72.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-odbc-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-contrib-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-perl-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-devel-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-python-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-docs-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-server-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-jdbc-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-tcl-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-libs-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-tk-7.1.3-5.72.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-odbc-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-contrib-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-perl-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-devel-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-python-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-docs-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-server-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-jdbc-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-tcl-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-libs-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-tk-7.1.3-5.72.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/postgresql-7.2.4-5.73.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-contrib-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-devel-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-docs-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-jdbc-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-libs-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-odbc-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-test-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-perl-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-python-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-server-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-tcl-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-tk-7.2.4-5.73.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/postgresql-7.2.4-5.80.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-contrib-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-devel-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-docs-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-jdbc-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-test-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-libs-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-odbc-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-perl-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-python-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-server-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-tcl-7.2.4-5.80.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/postgresql-tk-7.2.4-5.80.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/postgresql-7.3.4-3.rhl9.src.rpm
ftp://updates.redhat.com/9/en/os/SRPMS/postgresql72-1-4.rhl9.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/postgresql-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-contrib-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-devel-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-docs-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-jdbc-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-libs-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-pl-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-python-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-server-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-tcl-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql-test-7.3.4-3.rhl9.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/postgresql72-libs-1-4.rhl9.i386.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------
3b9e2ff8e10ee73235eee4f9878b3e2c 7.2/en/os/SRPMS/postgresql-7.1.3-5.72.src.rpm
7c3a5d6ca1f7f2dd8e72f5b6a8f1f08e 7.2/en/os/i386/postgresql-7.1.3-5.72.i386.rpm
199e0b350daddc1c5b0a6863a0d594e4 7.2/en/os/i386/postgresql-contrib-7.1.3-5.72.i386.rpm
f598ffaa61d0658bc7a014f726c27eb4 7.2/en/os/i386/postgresql-devel-7.1.3-5.72.i386.rpm
76b24489acbefa1d68a85334e9dc75aa 7.2/en/os/i386/postgresql-docs-7.1.3-5.72.i386.rpm
a7fbf57b5239a0f0dc1f2090eb9986c4 7.2/en/os/i386/postgresql-jdbc-7.1.3-5.72.i386.rpm
8a0b4bc8cf4a10acaafd77ac07487841 7.2/en/os/i386/postgresql-libs-7.1.3-5.72.i386.rpm
f53828955915f3f85e4bdd9b5ff13100 7.2/en/os/i386/postgresql-odbc-7.1.3-5.72.i386.rpm
2175a2b30a15ba0fd704f456e89bf620 7.2/en/os/i386/postgresql-perl-7.1.3-5.72.i386.rpm
8daab695f8f792ebc9b6e1f7bb9e4b3e 7.2/en/os/i386/postgresql-python-7.1.3-5.72.i386.rpm
d6dcd736623928aa3bc0c86774fd677e 7.2/en/os/i386/postgresql-server-7.1.3-5.72.i386.rpm
0e91e4b7df893387076d854f578899eb 7.2/en/os/i386/postgresql-tcl-7.1.3-5.72.i386.rpm
d221da70f77bcfde3e45db2f5031963f 7.2/en/os/i386/postgresql-tk-7.1.3-5.72.i386.rpm
a08d75e1e6822ad15ad013c85e6120c7 7.2/en/os/ia64/postgresql-7.1.3-5.72.ia64.rpm
7e28d5be8e0bd0d818165bec29ada464 7.2/en/os/ia64/postgresql-contrib-7.1.3-5.72.ia64.rpm
449ecf2e6e4366da0c40ea19cbec9d44 7.2/en/os/ia64/postgresql-devel-7.1.3-5.72.ia64.rpm
870a3375a086024dbb39f9045d4a8e5d 7.2/en/os/ia64/postgresql-docs-7.1.3-5.72.ia64.rpm
dca82ba0c32af1eeba14d6dd2c5900f1 7.2/en/os/ia64/postgresql-jdbc-7.1.3-5.72.ia64.rpm
7011e7f2a8dc5783a85fb4aac8021318 7.2/en/os/ia64/postgresql-libs-7.1.3-5.72.ia64.rpm
c29108c4f8aa08c10f3abbda7da44e2a 7.2/en/os/ia64/postgresql-odbc-7.1.3-5.72.ia64.rpm
a1de988920b4f4168cf3e5f6e1948d33 7.2/en/os/ia64/postgresql-perl-7.1.3-5.72.ia64.rpm
b76c3fdd7fd75022090ab2b3e34f89c5 7.2/en/os/ia64/postgresql-python-7.1.3-5.72.ia64.rpm
708e6aee14651d95c4545dca0ddb019b 7.2/en/os/ia64/postgresql-server-7.1.3-5.72.ia64.rpm
c6534b3683ae56c26f2dd7cddcf18850 7.2/en/os/ia64/postgresql-tcl-7.1.3-5.72.ia64.rpm
955f17c80ebfcca0d47a51b4b673cc49 7.2/en/os/ia64/postgresql-tk-7.1.3-5.72.ia64.rpm
14ea1e277128556a0917ff80f0100c41 7.3/en/os/SRPMS/postgresql-7.2.4-5.73.src.rpm
abd2341cc0b8f427f0f84c8ce6f7710e 7.3/en/os/i386/postgresql-7.2.4-5.73.i386.rpm
602a38f5dbd6b3a6f28c24316302d054 7.3/en/os/i386/postgresql-contrib-7.2.4-5.73.i386.rpm
d6bcea09edb4a5f2b4e359aec148fac6 7.3/en/os/i386/postgresql-devel-7.2.4-5.73.i386.rpm
3676c768fd98d65afaa36cf87a425f52 7.3/en/os/i386/postgresql-docs-7.2.4-5.73.i386.rpm
7fd081b51a0f58d4fe0cb0c9ab9f75cf 7.3/en/os/i386/postgresql-jdbc-7.2.4-5.73.i386.rpm
18783f38869468526aa6b08f3a83be20 7.3/en/os/i386/postgresql-libs-7.2.4-5.73.i386.rpm
0a8755748029b7a00cd72fdd983cd393 7.3/en/os/i386/postgresql-odbc-7.2.4-5.73.i386.rpm
838689dc075829db6daa31008bcf023f 7.3/en/os/i386/postgresql-perl-7.2.4-5.73.i386.rpm
f9ba380c5ffb8d60ea3a3a56a058a026 7.3/en/os/i386/postgresql-python-7.2.4-5.73.i386.rpm
f7c597c8a1e570b05cc2e96aaff36976 7.3/en/os/i386/postgresql-server-7.2.4-5.73.i386.rpm
5953fa3fb0b5c9b60995fea6f4d7a0bc 7.3/en/os/i386/postgresql-tcl-7.2.4-5.73.i386.rpm
9ed994f7a7bb893ad7231e9f061d6096 7.3/en/os/i386/postgresql-test-7.2.4-5.73.i386.rpm
eecaf538b82017ef9d9477e705dfe43e 7.3/en/os/i386/postgresql-tk-7.2.4-5.73.i386.rpm
41ddf2310b09192ece222c63db493bed 8.0/en/os/SRPMS/postgresql-7.2.4-5.80.src.rpm
10db84d5b83030a2e067863409c1483b 8.0/en/os/i386/postgresql-7.2.4-5.80.i386.rpm
355456728b812be50b511ac5ae5463cc 8.0/en/os/i386/postgresql-contrib-7.2.4-5.80.i386.rpm
2030c7cbaf2f6d9e7f8e418d85a5ae60 8.0/en/os/i386/postgresql-devel-7.2.4-5.80.i386.rpm
9d6573e6a1a28b3b49bcda3623bef83c 8.0/en/os/i386/postgresql-docs-7.2.4-5.80.i386.rpm
aba014dc312cb5f7456d9b95127d9c2d 8.0/en/os/i386/postgresql-jdbc-7.2.4-5.80.i386.rpm
ef7265999840169355faa8e1154d589c 8.0/en/os/i386/postgresql-libs-7.2.4-5.80.i386.rpm
10f6deacdcf4a8a0c0c033b339dd303f 8.0/en/os/i386/postgresql-odbc-7.2.4-5.80.i386.rpm
10266423863102563567bbc0a938d513 8.0/en/os/i386/postgresql-perl-7.2.4-5.80.i386.rpm
6918680b05f07654ca75996555df4d1d 8.0/en/os/i386/postgresql-python-7.2.4-5.80.i386.rpm
f0fbf27d2057e2eb89fb50dd8ec2f98f 8.0/en/os/i386/postgresql-server-7.2.4-5.80.i386.rpm
1a55f8dd7106b2986cad8a0a1160d6af 8.0/en/os/i386/postgresql-tcl-7.2.4-5.80.i386.rpm
cd10624a6f4a4d23e9d4d689972bb139 8.0/en/os/i386/postgresql-test-7.2.4-5.80.i386.rpm
acfcdc841d428c6546f5394906a8f488 8.0/en/os/i386/postgresql-tk-7.2.4-5.80.i386.rpm
ea813d6b53f8d59a68409c6ef567be2f 9/en/os/SRPMS/postgresql-7.3.4-3.rhl9.src.rpm
9fce9c3b0b03ff17d7c4e07adcd5e586 9/en/os/SRPMS/postgresql72-1-4.rhl9.src.rpm
a04d50e0d624f303757838666c330694 9/en/os/i386/postgresql-7.3.4-3.rhl9.i386.rpm
5ea368b9969bc8398304e30565ff9eea 9/en/os/i386/postgresql-contrib-7.3.4-3.rhl9.i386.rpm
714c16b8231b455751313a39adf62551 9/en/os/i386/postgresql-devel-7.3.4-3.rhl9.i386.rpm
4abc44081cc8a7b3990ac56381d05695 9/en/os/i386/postgresql-docs-7.3.4-3.rhl9.i386.rpm
8f74c8789290e339f978dfdd2ca31e98 9/en/os/i386/postgresql-jdbc-7.3.4-3.rhl9.i386.rpm
f466ae466664eb36444660405d6d0356 9/en/os/i386/postgresql-libs-7.3.4-3.rhl9.i386.rpm
a1408c200bbe537636cb220c675f9e00 9/en/os/i386/postgresql-pl-7.3.4-3.rhl9.i386.rpm
f835b6362b70f5feda9badb3658f32d2 9/en/os/i386/postgresql-python-7.3.4-3.rhl9.i386.rpm
8295e804046d6817c59eccdfa69bb44b 9/en/os/i386/postgresql-server-7.3.4-3.rhl9.i386.rpm
8cf2d9dc83d75423dade021d6f791722 9/en/os/i386/postgresql-tcl-7.3.4-3.rhl9.i386.rpm
514ebe0beda8da4446fda4cb4b221bbe 9/en/os/i386/postgresql-test-7.3.4-3.rhl9.i386.rpm
bbfb1a97b62ecb8f8f653c3b1bff5d65 9/en/os/i386/postgresql72-libs-1-4.rhl9.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://www.securityfocus.com/bid/8741
http://archives.postgresql.org/pgsql-bugs/2003-09/msg00014.php
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0901

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/s0HxXlSAg2UNWIIRArV4AJ9YoroZdv21/ssNvpsXcXsL+oNiLgCcDM2n
gvsWFEw2A59OLIKqUvNQymY=
=lQKU
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBP7RiNyh9+71yA2DNAQEQxwP+JZKbAc+Wg9J5sS46HJOnp5Ff/q9WWs1E
xnC551EfS9qvDy+6ScohpwgU88eUB4/7Y/RcpBKxw231R0sQ6z36mdLV8djIVGft
gwuzaBKPqL0vyvxO8Dxbp6/urGggPs2hve8UBBllVNC/gNLFCqZXr2W38ccf7ccT
KPirJXqpzd4=
=7Flr
-----END PGP SIGNATURE-----