-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3821
                      java-17-openjdk security update
                             10 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           java-17-openjdk
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Modify Arbitrary Files    -- Remote with User Interaction
                   Overwrite Arbitrary Files -- Remote with User Interaction
                   Denial of Service         -- Remote with User Interaction
                   Access Confidential Data  -- Remote with User Interaction
                   Unauthorised Access       -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-35603 CVE-2021-35586 CVE-2021-35578
                   CVE-2021-35567 CVE-2021-35564 CVE-2021-35561
                   CVE-2021-35559 CVE-2021-35556 

Reference:         ESB-2021.3775
                   ESB-2021.3636
                   ESB-2021.3494
                   ESB-2021.3493

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:4135

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: java-17-openjdk security update
Advisory ID:       RHSA-2021:4135-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:4135
Issue date:        2021-11-09
CVE Names:         CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 
                   CVE-2021-35564 CVE-2021-35567 CVE-2021-35578 
                   CVE-2021-35586 CVE-2021-35603 
=====================================================================

1. Summary:

An update for java-17-openjdk is now available for Red Hat Enterprise Linux
8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The java-17-openjdk packages provide the OpenJDK 17 Java Runtime
Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Incorrect principal selection when using Kerberos Constrained
Delegation (Libraries, 8266689) (CVE-2021-35567)

* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167)
(CVE-2021-35556)

* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580)
(CVE-2021-35559)

* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility,
8266097) (CVE-2021-35561)

* OpenJDK: Certificates with end dates too far in the future can corrupt
keystore (Keytool, 8266137) (CVE-2021-35564)

* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)
(CVE-2021-35578)

* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)
(CVE-2021-35586)

* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
(CVE-2021-35603)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2014515 - CVE-2021-35556 OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167)
2014518 - CVE-2021-35559 OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580)
2014524 - CVE-2021-35561 OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097)
2015061 - CVE-2021-35564 OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137)
2015308 - CVE-2021-35586 OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)
2015311 - CVE-2021-35603 OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
2015653 - CVE-2021-35578 OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)
2015658 - CVE-2021-35567 OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689)

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
java-17-openjdk-17.0.1.0.12-2.el8_5.src.rpm

aarch64:
java-17-openjdk-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-demo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-javadoc-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-javadoc-zip-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-jmods-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-src-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-static-libs-17.0.1.0.12-2.el8_5.aarch64.rpm

ppc64le:
java-17-openjdk-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-demo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-javadoc-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-javadoc-zip-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-jmods-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-src-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-static-libs-17.0.1.0.12-2.el8_5.ppc64le.rpm

s390x:
java-17-openjdk-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-demo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-javadoc-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-javadoc-zip-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-jmods-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-src-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-static-libs-17.0.1.0.12-2.el8_5.s390x.rpm

x86_64:
java-17-openjdk-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-demo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-javadoc-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-javadoc-zip-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-jmods-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-src-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-static-libs-17.0.1.0.12-2.el8_5.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 8):

aarch64:
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-demo-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-demo-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-jmods-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-jmods-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-src-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-src-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-static-libs-fastdebug-17.0.1.0.12-2.el8_5.aarch64.rpm
java-17-openjdk-static-libs-slowdebug-17.0.1.0.12-2.el8_5.aarch64.rpm

ppc64le:
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-demo-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-demo-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-jmods-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-jmods-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-src-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-src-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-static-libs-fastdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm
java-17-openjdk-static-libs-slowdebug-17.0.1.0.12-2.el8_5.ppc64le.rpm

s390x:
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-demo-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-jmods-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-src-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm
java-17-openjdk-static-libs-slowdebug-17.0.1.0.12-2.el8_5.s390x.rpm

x86_64:
java-17-openjdk-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-debugsource-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-demo-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-demo-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-devel-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-fastdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-headless-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-jmods-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-jmods-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-slowdebug-debuginfo-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-src-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-src-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-static-libs-fastdebug-17.0.1.0.12-2.el8_5.x86_64.rpm
java-17-openjdk-static-libs-slowdebug-17.0.1.0.12-2.el8_5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-35556
https://access.redhat.com/security/cve/CVE-2021-35559
https://access.redhat.com/security/cve/CVE-2021-35561
https://access.redhat.com/security/cve/CVE-2021-35564
https://access.redhat.com/security/cve/CVE-2021-35567
https://access.redhat.com/security/cve/CVE-2021-35578
https://access.redhat.com/security/cve/CVE-2021-35586
https://access.redhat.com/security/cve/CVE-2021-35603
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ssOU
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WBNA
-----END PGP SIGNATURE-----