Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0255 Moderate: php security, bug fix and enhancement update 22 February 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Modify Arbitrary Files -- Remote with User Interaction Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2012-2688 CVE-2012-0831 CVE-2011-1398 Reference: ASB-2012.0105 ESB-2012.0899 ESB-2012.0755 ESB-2012.0159 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2013-0514.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: php security, bug fix and enhancement update Advisory ID: RHSA-2013:0514-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0514.html Issue date: 2013-02-21 CVE Names: CVE-2011-1398 CVE-2012-0831 CVE-2012-2688 ===================================================================== 1. Summary: Updated php packages that fix three security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was found that PHP did not check for carriage returns in HTTP headers, allowing intended HTTP response splitting protections to be bypassed. Depending on the web browser the victim is using, a remote attacker could use this flaw to perform HTTP response splitting attacks. (CVE-2011-1398) An integer signedness issue, leading to a heap-based buffer underflow, was found in the PHP scandir() function. If a remote attacker could upload an excessively large number of files to a directory the scandir() function runs on, it could cause the PHP interpreter to crash or, possibly, execute arbitrary code. (CVE-2012-2688) It was found that PHP did not correctly handle the magic_quotes_gpc configuration directive. This could result in magic_quotes_gpc input escaping not being applied in all cases, possibly making it easier for a remote attacker to perform SQL injection attacks. (CVE-2012-0831) These updated php packages also include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked to in the References, for information on the most significant of these changes. All users of php are advised to upgrade to these updated packages, which fix these issues and add these enhancements. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 771738 - var_export on negative array indexes returns unsigned index id 789468 - CVE-2012-0831 php: PG(magic_quote_gpc) was not restored on shutdown 812819 - setDate, setISODate, setTime works wrong when DateTime created from timestamp 824199 - PDOStatement execute segfaults for pdo_mysql driver 824293 - Include php-fpm in php build 828051 - CVE-2012-2688 php: Integer Signedness issues in _php_stream_scandir 833545 - dependencies on php-common are not arch-specific. 837042 - add php(language) virtual provide 853329 - CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass 858653 - fileinfo extension: use stat function from stream wrapper 868375 - $this becomes a non-object 874987 - Missing provides in php-xml 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/php-5.3.3-22.el6.src.rpm i386: php-5.3.3-22.el6.i686.rpm php-bcmath-5.3.3-22.el6.i686.rpm php-cli-5.3.3-22.el6.i686.rpm php-common-5.3.3-22.el6.i686.rpm php-dba-5.3.3-22.el6.i686.rpm php-debuginfo-5.3.3-22.el6.i686.rpm php-devel-5.3.3-22.el6.i686.rpm php-embedded-5.3.3-22.el6.i686.rpm php-enchant-5.3.3-22.el6.i686.rpm php-fpm-5.3.3-22.el6.i686.rpm php-gd-5.3.3-22.el6.i686.rpm php-imap-5.3.3-22.el6.i686.rpm php-intl-5.3.3-22.el6.i686.rpm php-ldap-5.3.3-22.el6.i686.rpm php-mbstring-5.3.3-22.el6.i686.rpm php-mysql-5.3.3-22.el6.i686.rpm php-odbc-5.3.3-22.el6.i686.rpm php-pdo-5.3.3-22.el6.i686.rpm php-pgsql-5.3.3-22.el6.i686.rpm php-process-5.3.3-22.el6.i686.rpm php-pspell-5.3.3-22.el6.i686.rpm php-recode-5.3.3-22.el6.i686.rpm php-snmp-5.3.3-22.el6.i686.rpm php-soap-5.3.3-22.el6.i686.rpm php-tidy-5.3.3-22.el6.i686.rpm php-xml-5.3.3-22.el6.i686.rpm php-xmlrpc-5.3.3-22.el6.i686.rpm php-zts-5.3.3-22.el6.i686.rpm x86_64: php-5.3.3-22.el6.x86_64.rpm php-bcmath-5.3.3-22.el6.x86_64.rpm php-cli-5.3.3-22.el6.x86_64.rpm php-common-5.3.3-22.el6.x86_64.rpm php-dba-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-devel-5.3.3-22.el6.x86_64.rpm php-embedded-5.3.3-22.el6.x86_64.rpm php-enchant-5.3.3-22.el6.x86_64.rpm php-fpm-5.3.3-22.el6.x86_64.rpm php-gd-5.3.3-22.el6.x86_64.rpm php-imap-5.3.3-22.el6.x86_64.rpm php-intl-5.3.3-22.el6.x86_64.rpm php-ldap-5.3.3-22.el6.x86_64.rpm php-mbstring-5.3.3-22.el6.x86_64.rpm php-mysql-5.3.3-22.el6.x86_64.rpm php-odbc-5.3.3-22.el6.x86_64.rpm php-pdo-5.3.3-22.el6.x86_64.rpm php-pgsql-5.3.3-22.el6.x86_64.rpm php-process-5.3.3-22.el6.x86_64.rpm php-pspell-5.3.3-22.el6.x86_64.rpm php-recode-5.3.3-22.el6.x86_64.rpm php-snmp-5.3.3-22.el6.x86_64.rpm php-soap-5.3.3-22.el6.x86_64.rpm php-tidy-5.3.3-22.el6.x86_64.rpm php-xml-5.3.3-22.el6.x86_64.rpm php-xmlrpc-5.3.3-22.el6.x86_64.rpm php-zts-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-22.el6.src.rpm x86_64: php-cli-5.3.3-22.el6.x86_64.rpm php-common-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-22.el6.src.rpm x86_64: php-5.3.3-22.el6.x86_64.rpm php-bcmath-5.3.3-22.el6.x86_64.rpm php-dba-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-devel-5.3.3-22.el6.x86_64.rpm php-embedded-5.3.3-22.el6.x86_64.rpm php-enchant-5.3.3-22.el6.x86_64.rpm php-fpm-5.3.3-22.el6.x86_64.rpm php-gd-5.3.3-22.el6.x86_64.rpm php-imap-5.3.3-22.el6.x86_64.rpm php-intl-5.3.3-22.el6.x86_64.rpm php-ldap-5.3.3-22.el6.x86_64.rpm php-mbstring-5.3.3-22.el6.x86_64.rpm php-mysql-5.3.3-22.el6.x86_64.rpm php-odbc-5.3.3-22.el6.x86_64.rpm php-pdo-5.3.3-22.el6.x86_64.rpm php-pgsql-5.3.3-22.el6.x86_64.rpm php-process-5.3.3-22.el6.x86_64.rpm php-pspell-5.3.3-22.el6.x86_64.rpm php-recode-5.3.3-22.el6.x86_64.rpm php-snmp-5.3.3-22.el6.x86_64.rpm php-soap-5.3.3-22.el6.x86_64.rpm php-tidy-5.3.3-22.el6.x86_64.rpm php-xml-5.3.3-22.el6.x86_64.rpm php-xmlrpc-5.3.3-22.el6.x86_64.rpm php-zts-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-22.el6.src.rpm i386: php-5.3.3-22.el6.i686.rpm php-cli-5.3.3-22.el6.i686.rpm php-common-5.3.3-22.el6.i686.rpm php-debuginfo-5.3.3-22.el6.i686.rpm php-gd-5.3.3-22.el6.i686.rpm php-ldap-5.3.3-22.el6.i686.rpm php-mysql-5.3.3-22.el6.i686.rpm php-odbc-5.3.3-22.el6.i686.rpm php-pdo-5.3.3-22.el6.i686.rpm php-pgsql-5.3.3-22.el6.i686.rpm php-soap-5.3.3-22.el6.i686.rpm php-xml-5.3.3-22.el6.i686.rpm php-xmlrpc-5.3.3-22.el6.i686.rpm ppc64: php-5.3.3-22.el6.ppc64.rpm php-cli-5.3.3-22.el6.ppc64.rpm php-common-5.3.3-22.el6.ppc64.rpm php-debuginfo-5.3.3-22.el6.ppc64.rpm php-gd-5.3.3-22.el6.ppc64.rpm php-ldap-5.3.3-22.el6.ppc64.rpm php-mysql-5.3.3-22.el6.ppc64.rpm php-odbc-5.3.3-22.el6.ppc64.rpm php-pdo-5.3.3-22.el6.ppc64.rpm php-pgsql-5.3.3-22.el6.ppc64.rpm php-soap-5.3.3-22.el6.ppc64.rpm php-xml-5.3.3-22.el6.ppc64.rpm php-xmlrpc-5.3.3-22.el6.ppc64.rpm s390x: php-5.3.3-22.el6.s390x.rpm php-cli-5.3.3-22.el6.s390x.rpm php-common-5.3.3-22.el6.s390x.rpm php-debuginfo-5.3.3-22.el6.s390x.rpm php-gd-5.3.3-22.el6.s390x.rpm php-ldap-5.3.3-22.el6.s390x.rpm php-mysql-5.3.3-22.el6.s390x.rpm php-odbc-5.3.3-22.el6.s390x.rpm php-pdo-5.3.3-22.el6.s390x.rpm php-pgsql-5.3.3-22.el6.s390x.rpm php-soap-5.3.3-22.el6.s390x.rpm php-xml-5.3.3-22.el6.s390x.rpm php-xmlrpc-5.3.3-22.el6.s390x.rpm x86_64: php-5.3.3-22.el6.x86_64.rpm php-cli-5.3.3-22.el6.x86_64.rpm php-common-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-gd-5.3.3-22.el6.x86_64.rpm php-ldap-5.3.3-22.el6.x86_64.rpm php-mysql-5.3.3-22.el6.x86_64.rpm php-odbc-5.3.3-22.el6.x86_64.rpm php-pdo-5.3.3-22.el6.x86_64.rpm php-pgsql-5.3.3-22.el6.x86_64.rpm php-soap-5.3.3-22.el6.x86_64.rpm php-xml-5.3.3-22.el6.x86_64.rpm php-xmlrpc-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-22.el6.src.rpm i386: php-bcmath-5.3.3-22.el6.i686.rpm php-dba-5.3.3-22.el6.i686.rpm php-debuginfo-5.3.3-22.el6.i686.rpm php-devel-5.3.3-22.el6.i686.rpm php-embedded-5.3.3-22.el6.i686.rpm php-enchant-5.3.3-22.el6.i686.rpm php-fpm-5.3.3-22.el6.i686.rpm php-imap-5.3.3-22.el6.i686.rpm php-intl-5.3.3-22.el6.i686.rpm php-mbstring-5.3.3-22.el6.i686.rpm php-process-5.3.3-22.el6.i686.rpm php-pspell-5.3.3-22.el6.i686.rpm php-recode-5.3.3-22.el6.i686.rpm php-snmp-5.3.3-22.el6.i686.rpm php-tidy-5.3.3-22.el6.i686.rpm php-zts-5.3.3-22.el6.i686.rpm ppc64: php-bcmath-5.3.3-22.el6.ppc64.rpm php-dba-5.3.3-22.el6.ppc64.rpm php-debuginfo-5.3.3-22.el6.ppc64.rpm php-devel-5.3.3-22.el6.ppc64.rpm php-embedded-5.3.3-22.el6.ppc64.rpm php-enchant-5.3.3-22.el6.ppc64.rpm php-fpm-5.3.3-22.el6.ppc64.rpm php-imap-5.3.3-22.el6.ppc64.rpm php-intl-5.3.3-22.el6.ppc64.rpm php-mbstring-5.3.3-22.el6.ppc64.rpm php-process-5.3.3-22.el6.ppc64.rpm php-pspell-5.3.3-22.el6.ppc64.rpm php-recode-5.3.3-22.el6.ppc64.rpm php-snmp-5.3.3-22.el6.ppc64.rpm php-tidy-5.3.3-22.el6.ppc64.rpm php-zts-5.3.3-22.el6.ppc64.rpm s390x: php-bcmath-5.3.3-22.el6.s390x.rpm php-dba-5.3.3-22.el6.s390x.rpm php-debuginfo-5.3.3-22.el6.s390x.rpm php-devel-5.3.3-22.el6.s390x.rpm php-embedded-5.3.3-22.el6.s390x.rpm php-enchant-5.3.3-22.el6.s390x.rpm php-fpm-5.3.3-22.el6.s390x.rpm php-imap-5.3.3-22.el6.s390x.rpm php-intl-5.3.3-22.el6.s390x.rpm php-mbstring-5.3.3-22.el6.s390x.rpm php-process-5.3.3-22.el6.s390x.rpm php-pspell-5.3.3-22.el6.s390x.rpm php-recode-5.3.3-22.el6.s390x.rpm php-snmp-5.3.3-22.el6.s390x.rpm php-tidy-5.3.3-22.el6.s390x.rpm php-zts-5.3.3-22.el6.s390x.rpm x86_64: php-bcmath-5.3.3-22.el6.x86_64.rpm php-dba-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-devel-5.3.3-22.el6.x86_64.rpm php-embedded-5.3.3-22.el6.x86_64.rpm php-enchant-5.3.3-22.el6.x86_64.rpm php-fpm-5.3.3-22.el6.x86_64.rpm php-imap-5.3.3-22.el6.x86_64.rpm php-intl-5.3.3-22.el6.x86_64.rpm php-mbstring-5.3.3-22.el6.x86_64.rpm php-process-5.3.3-22.el6.x86_64.rpm php-pspell-5.3.3-22.el6.x86_64.rpm php-recode-5.3.3-22.el6.x86_64.rpm php-snmp-5.3.3-22.el6.x86_64.rpm php-tidy-5.3.3-22.el6.x86_64.rpm php-zts-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-22.el6.src.rpm i386: php-5.3.3-22.el6.i686.rpm php-cli-5.3.3-22.el6.i686.rpm php-common-5.3.3-22.el6.i686.rpm php-debuginfo-5.3.3-22.el6.i686.rpm php-gd-5.3.3-22.el6.i686.rpm php-ldap-5.3.3-22.el6.i686.rpm php-mysql-5.3.3-22.el6.i686.rpm php-odbc-5.3.3-22.el6.i686.rpm php-pdo-5.3.3-22.el6.i686.rpm php-pgsql-5.3.3-22.el6.i686.rpm php-soap-5.3.3-22.el6.i686.rpm php-xml-5.3.3-22.el6.i686.rpm php-xmlrpc-5.3.3-22.el6.i686.rpm x86_64: php-5.3.3-22.el6.x86_64.rpm php-cli-5.3.3-22.el6.x86_64.rpm php-common-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-gd-5.3.3-22.el6.x86_64.rpm php-ldap-5.3.3-22.el6.x86_64.rpm php-mysql-5.3.3-22.el6.x86_64.rpm php-odbc-5.3.3-22.el6.x86_64.rpm php-pdo-5.3.3-22.el6.x86_64.rpm php-pgsql-5.3.3-22.el6.x86_64.rpm php-soap-5.3.3-22.el6.x86_64.rpm php-xml-5.3.3-22.el6.x86_64.rpm php-xmlrpc-5.3.3-22.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-22.el6.src.rpm i386: php-bcmath-5.3.3-22.el6.i686.rpm php-dba-5.3.3-22.el6.i686.rpm php-debuginfo-5.3.3-22.el6.i686.rpm php-devel-5.3.3-22.el6.i686.rpm php-embedded-5.3.3-22.el6.i686.rpm php-enchant-5.3.3-22.el6.i686.rpm php-fpm-5.3.3-22.el6.i686.rpm php-imap-5.3.3-22.el6.i686.rpm php-intl-5.3.3-22.el6.i686.rpm php-mbstring-5.3.3-22.el6.i686.rpm php-process-5.3.3-22.el6.i686.rpm php-pspell-5.3.3-22.el6.i686.rpm php-recode-5.3.3-22.el6.i686.rpm php-snmp-5.3.3-22.el6.i686.rpm php-tidy-5.3.3-22.el6.i686.rpm php-zts-5.3.3-22.el6.i686.rpm x86_64: php-bcmath-5.3.3-22.el6.x86_64.rpm php-dba-5.3.3-22.el6.x86_64.rpm php-debuginfo-5.3.3-22.el6.x86_64.rpm php-devel-5.3.3-22.el6.x86_64.rpm php-embedded-5.3.3-22.el6.x86_64.rpm php-enchant-5.3.3-22.el6.x86_64.rpm php-fpm-5.3.3-22.el6.x86_64.rpm php-imap-5.3.3-22.el6.x86_64.rpm php-intl-5.3.3-22.el6.x86_64.rpm php-mbstring-5.3.3-22.el6.x86_64.rpm php-process-5.3.3-22.el6.x86_64.rpm php-pspell-5.3.3-22.el6.x86_64.rpm php-recode-5.3.3-22.el6.x86_64.rpm php-snmp-5.3.3-22.el6.x86_64.rpm php-tidy-5.3.3-22.el6.x86_64.rpm php-zts-5.3.3-22.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1398.html https://www.redhat.com/security/data/cve/CVE-2012-0831.html https://www.redhat.com/security/data/cve/CVE-2012-2688.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/php.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRJcFqXlSAg2UNWIIRAlARAJ4lNUzK+Ob9fBt1nTCs/ciQY1HF/ACePdIf lPql027HCpjESlPdZVlvCSM= =h7Cb - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUSb7me4yVqjM2NGpAQLQ4Q//QY5969kSmc04x+XMeis5owwH6YYjtEs6 GjQ7XS3OVvHermt0ETiPafvyUPRZPusSrgwQQjiqBh4J/7iH7jeOFb8r9USNcOpZ mJisySBJieOYP2F3Ewg67fL3ewWOC3u6vCPlGWu6yi2qOxXEpsYzgoNwEu5jqQYu c+BrOpGzgj1+Gf/jxdBKIDVI72FY3cH7/tW3OtC1ZS7FgZ8Q9uIVJGvwvJzT0+N6 m3g3rarawdZhMEaXWX0E1SO8PX0VMqjtl9ul8gxJy+Q8reegb7OKqLx6G/GeTI/X 6Do/Tmn6FRHmOvHn2dvQC5q3n0fvI/CUjTZhmLKh3TLBhZ+/3AkHBQ3QPeWKj4WD cZOSBu+vMWLpS96yFeIL/xUmL2/kiF71ytw7+a1p3RRXAbEdsD/4nyDD8Js98LrU XLepHv9vLfQdS7gS25LzxiCJnxdYwk2B/xfOLCldH+wR1GsXAOh/XPpDG3wY5Y1Z /4sUo7OgYa2eVPz3Nc9G9wtI5Ac2stSIqN6fx2DZhttBrKGbKKiZtcpA4Vcy+xIj jZKOFXRuV43M0pkB4tEauz6ow5okqcvUWe8FhcRcM07OdJQMPKtj/5Uw4vOgSWDL HQu8+LEMumZYLWpE9fBmdUyG/CgincOlnuk2QXX5b8bRqYCjDNhzVeH7iQQoMkvr M3Jz9sJ8x/Q= =3xbu -----END PGP SIGNATURE-----