Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3977 rpm security update 24 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: rpm Publisher: Red Hat Operating System: Red Hat Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-20271 Reference: ESB-2021.3448 ESB-2021.3141 ESB-2021.2959 ESB-2021.2897 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:4785 https://access.redhat.com/errata/RHSA-2021:4771 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rpm security update Advisory ID: RHSA-2021:4785-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4785 Issue date: 2021-11-23 CVE Names: CVE-2021-20271 ===================================================================== 1. Summary: An update for rpm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications linked against the RPM library must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1934125 - CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: rpm-4.11.3-48.el7_9.src.rpm x86_64: rpm-4.11.3-48.el7_9.x86_64.rpm rpm-build-4.11.3-48.el7_9.x86_64.rpm rpm-build-libs-4.11.3-48.el7_9.i686.rpm rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-libs-4.11.3-48.el7_9.i686.rpm rpm-libs-4.11.3-48.el7_9.x86_64.rpm rpm-python-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: rpm-apidocs-4.11.3-48.el7_9.noarch.rpm rpm-cron-4.11.3-48.el7_9.noarch.rpm x86_64: rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-devel-4.11.3-48.el7_9.i686.rpm rpm-devel-4.11.3-48.el7_9.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm rpm-sign-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: rpm-4.11.3-48.el7_9.src.rpm x86_64: rpm-4.11.3-48.el7_9.x86_64.rpm rpm-build-4.11.3-48.el7_9.x86_64.rpm rpm-build-libs-4.11.3-48.el7_9.i686.rpm rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-libs-4.11.3-48.el7_9.i686.rpm rpm-libs-4.11.3-48.el7_9.x86_64.rpm rpm-python-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: rpm-apidocs-4.11.3-48.el7_9.noarch.rpm rpm-cron-4.11.3-48.el7_9.noarch.rpm x86_64: rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-devel-4.11.3-48.el7_9.i686.rpm rpm-devel-4.11.3-48.el7_9.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm rpm-sign-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: rpm-4.11.3-48.el7_9.src.rpm ppc64: rpm-4.11.3-48.el7_9.ppc64.rpm rpm-build-4.11.3-48.el7_9.ppc64.rpm rpm-build-libs-4.11.3-48.el7_9.ppc.rpm rpm-build-libs-4.11.3-48.el7_9.ppc64.rpm rpm-debuginfo-4.11.3-48.el7_9.ppc.rpm rpm-debuginfo-4.11.3-48.el7_9.ppc64.rpm rpm-devel-4.11.3-48.el7_9.ppc.rpm rpm-devel-4.11.3-48.el7_9.ppc64.rpm rpm-libs-4.11.3-48.el7_9.ppc.rpm rpm-libs-4.11.3-48.el7_9.ppc64.rpm rpm-python-4.11.3-48.el7_9.ppc64.rpm rpm-sign-4.11.3-48.el7_9.ppc64.rpm ppc64le: rpm-4.11.3-48.el7_9.ppc64le.rpm rpm-build-4.11.3-48.el7_9.ppc64le.rpm rpm-build-libs-4.11.3-48.el7_9.ppc64le.rpm rpm-debuginfo-4.11.3-48.el7_9.ppc64le.rpm rpm-devel-4.11.3-48.el7_9.ppc64le.rpm rpm-libs-4.11.3-48.el7_9.ppc64le.rpm rpm-python-4.11.3-48.el7_9.ppc64le.rpm rpm-sign-4.11.3-48.el7_9.ppc64le.rpm s390x: rpm-4.11.3-48.el7_9.s390x.rpm rpm-build-4.11.3-48.el7_9.s390x.rpm rpm-build-libs-4.11.3-48.el7_9.s390.rpm rpm-build-libs-4.11.3-48.el7_9.s390x.rpm rpm-debuginfo-4.11.3-48.el7_9.s390.rpm rpm-debuginfo-4.11.3-48.el7_9.s390x.rpm rpm-devel-4.11.3-48.el7_9.s390.rpm rpm-devel-4.11.3-48.el7_9.s390x.rpm rpm-libs-4.11.3-48.el7_9.s390.rpm rpm-libs-4.11.3-48.el7_9.s390x.rpm rpm-python-4.11.3-48.el7_9.s390x.rpm rpm-sign-4.11.3-48.el7_9.s390x.rpm x86_64: rpm-4.11.3-48.el7_9.x86_64.rpm rpm-build-4.11.3-48.el7_9.x86_64.rpm rpm-build-libs-4.11.3-48.el7_9.i686.rpm rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-devel-4.11.3-48.el7_9.i686.rpm rpm-devel-4.11.3-48.el7_9.x86_64.rpm rpm-libs-4.11.3-48.el7_9.i686.rpm rpm-libs-4.11.3-48.el7_9.x86_64.rpm rpm-python-4.11.3-48.el7_9.x86_64.rpm rpm-sign-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: rpm-apidocs-4.11.3-48.el7_9.noarch.rpm rpm-cron-4.11.3-48.el7_9.noarch.rpm ppc64: rpm-debuginfo-4.11.3-48.el7_9.ppc64.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.ppc64.rpm ppc64le: rpm-debuginfo-4.11.3-48.el7_9.ppc64le.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.ppc64le.rpm s390x: rpm-debuginfo-4.11.3-48.el7_9.s390x.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.s390x.rpm x86_64: rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: rpm-4.11.3-48.el7_9.src.rpm x86_64: rpm-4.11.3-48.el7_9.x86_64.rpm rpm-build-4.11.3-48.el7_9.x86_64.rpm rpm-build-libs-4.11.3-48.el7_9.i686.rpm rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm rpm-debuginfo-4.11.3-48.el7_9.i686.rpm rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-devel-4.11.3-48.el7_9.i686.rpm rpm-devel-4.11.3-48.el7_9.x86_64.rpm rpm-libs-4.11.3-48.el7_9.i686.rpm rpm-libs-4.11.3-48.el7_9.x86_64.rpm rpm-python-4.11.3-48.el7_9.x86_64.rpm rpm-sign-4.11.3-48.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: rpm-apidocs-4.11.3-48.el7_9.noarch.rpm rpm-cron-4.11.3-48.el7_9.noarch.rpm x86_64: rpm-debuginfo-4.11.3-48.el7_9.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-20271 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYZ1SBNzjgjWX9erEAQieOQ//aov94+yFfhQklxToOeNHNqnPf0vpTCHS II0UlPKYJpQo1AP72bzk95ipADQ5zyPhoPJK9uHxj/i9Q5OPG/v61EQN35aKb+kG d5lQRTxk1HT4V/U5QXtYk7+iKBwTrKtrbK8P5LqBRGFc4gefUPwie9EDSsjQXazR pseAkpR9+pg0dDcXfJVB6ba3ghG2zVWUvUMLCPrxx+RosSy4XfJxK3UqFXxW9/ZC 7iko5PxdDq1kUDd6x4edawE8FljAtyivDDs38GsTr0J5CfoZLwQVXzQuanC+cm8b EufTBEMqXAHDHNn67b2gH9OrVukqkZx9JjPjHPEvHoLWE9CP7RlyFu1saz0SMLiI o0w0zzCYZycBi5H72fBEph99gNhuCukfGeKrhEXLtY4c82rPcLKFby5ea6RsR21s XkhkFhEAlWF4j0vaW8EcXK34JwOrZVr65dXKAxz6rCkamJrfW7IetLCXtHpHpvtv 89TzQN5EQpNrN46yUU7Hk/ycTeX73TDXiD0eL/W9BWGJjxEUEnBesB348Nd8bqID 9G3rrjGewfVcEUj0moVflNp6NJpRSK9uCHUaaDJ0Eg/tTXqI3QPi3tTpgyj7vTOa z3szjgnhC2ILccjMjVTrOhopW+474CixAv53QN1QmZbM6L42GFqucdxOld/LjMqk oetFsKV1cF0= =J3KR - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rpm security update Advisory ID: RHSA-2021:4771-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4771 Issue date: 2021-11-23 CVE Names: CVE-2021-20271 ===================================================================== 1. Summary: An update for rpm is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.6) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - x86_64 3. Description: The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications linked against the RPM library must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1934125 - CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.6): Source: rpm-4.11.3-35.el7_6.2.src.rpm x86_64: rpm-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-devel-4.11.3-35.el7_6.2.i686.rpm rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm rpm-libs-4.11.3-35.el7_6.2.i686.rpm rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-python-4.11.3-35.el7_6.2.x86_64.rpm rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.6): Source: rpm-4.11.3-35.el7_6.2.src.rpm ppc64le: rpm-4.11.3-35.el7_6.2.ppc64le.rpm rpm-build-4.11.3-35.el7_6.2.ppc64le.rpm rpm-build-libs-4.11.3-35.el7_6.2.ppc64le.rpm rpm-debuginfo-4.11.3-35.el7_6.2.ppc64le.rpm rpm-devel-4.11.3-35.el7_6.2.ppc64le.rpm rpm-libs-4.11.3-35.el7_6.2.ppc64le.rpm rpm-python-4.11.3-35.el7_6.2.ppc64le.rpm rpm-sign-4.11.3-35.el7_6.2.ppc64le.rpm x86_64: rpm-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-devel-4.11.3-35.el7_6.2.i686.rpm rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm rpm-libs-4.11.3-35.el7_6.2.i686.rpm rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-python-4.11.3-35.el7_6.2.x86_64.rpm rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.6): Source: rpm-4.11.3-35.el7_6.2.src.rpm x86_64: rpm-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-4.11.3-35.el7_6.2.x86_64.rpm rpm-build-libs-4.11.3-35.el7_6.2.i686.rpm rpm-build-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-debuginfo-4.11.3-35.el7_6.2.i686.rpm rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-devel-4.11.3-35.el7_6.2.i686.rpm rpm-devel-4.11.3-35.el7_6.2.x86_64.rpm rpm-libs-4.11.3-35.el7_6.2.i686.rpm rpm-libs-4.11.3-35.el7_6.2.x86_64.rpm rpm-python-4.11.3-35.el7_6.2.x86_64.rpm rpm-sign-4.11.3-35.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.6): noarch: rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm rpm-cron-4.11.3-35.el7_6.2.noarch.rpm x86_64: rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.6): noarch: rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm rpm-cron-4.11.3-35.el7_6.2.noarch.rpm ppc64le: rpm-debuginfo-4.11.3-35.el7_6.2.ppc64le.rpm rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.ppc64le.rpm x86_64: rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.6): noarch: rpm-apidocs-4.11.3-35.el7_6.2.noarch.rpm rpm-cron-4.11.3-35.el7_6.2.noarch.rpm x86_64: rpm-debuginfo-4.11.3-35.el7_6.2.x86_64.rpm rpm-plugin-systemd-inhibit-4.11.3-35.el7_6.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-20271 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYZz9kdzjgjWX9erEAQjBVhAAhVWwglN0b8rmDy8bmCMUBc82Pa+DK/PX oQkc0cu+V8YT2V7bMqymnMac/8PI/Mg4nNkP7m2KQtNEyxPSsYSc8B0uNpQyyuE2 LKmZrm7QsJC9KFBPobzGnPMp1xkSaUVBy7KDG8+kchDOmCQ3pEnjkOaHv4B6gNN1 /L/gN5VpkbyrkWz/T5J3nsdZ6DmYRTe/2ewuZwzpZMukZXS9V6UbmnCKRQ7ORrLT Z21vINHYbVar9oKTdCVCjlIShLTkZuo0HlDU9GhT6tWkZF2lwDnw+1Q3pxnrYCbF Ea0Ner/O8aXLj9eFjczCZ2Qm8X7E2FJCcbGYY6dB8ylcPuZFHL4ZHBpTpUHCrKJM lL/4VSqs/KY6vJBmQsbeUSTtDSkjmfzI+SxGN9W4DVI1mRKRaqrvhkjt+3E766zL BbI+dssVyM2xnCFhkzX8r918bqLmKTFn6vVgSFZNWy2eMdT03wCd68N8RIndb1UN 4/Er2lkg4s7Zp1nf7oiK5HLlFt/mfZEEJ+k8S1crSziIySfgvtESnkuI1mPx56O1 jv9aQ4H+nu1AmcwHxdwVVa6izpeWGFSU9nC5HeGXlsz3VeEDwAUoPrOWra3B9zfB z3ZfH5ZaBBwLgQj52R6hBy55uFepyr0lUAwsv+gcvpYm9z4MSQ19SefqJBewmlf0 spvlSgwYHRg= =I2gA - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYZ2FI+NLKJtyKPYoAQiXtQ/9Gmhykrl32F0CXhuPHrrWGv2CsTaX22cn 5ezR7vdWXZF3CJQAmKD4pnuo94/Fr7WgsVYYTL7Vsu158hkeyGJZqz/4SPFkhfSq W5L5X1kKLawtiZSgLbV5laCTzevMej/66VrKSWn3ndBEpqCZK/RF/NeE3A04/lPa 7jqfNs7ykGcDYfqORrkab8v4HWw5pJFIk66e/M2I4hOk91imIhhnsrJBwr/AlTDk KLb3bnrNaPdD3nKsXhtSnxCfv+GiZXwb4JnlW9tfDst8Vl3x/+UVs7BAmg0zOLit HMQE26kiN04ArbQX/a8fCu1nnnQXmuNxZhJx/1qAZRsxXZXbdFAZo6AJWLkZfRzr FEw1a8Rz49P2oO38wMDv7zKNu1UDhGPHcbNNS4rvIUtjDBSLaAAHzF/6mqPzboDB DlOg7y/FFe5qa7+WnqRv7dnMl/DQAZVFnWqroP4J/MlTiJafo2mmbD2HP3D1BhRr /Tb6H3PqCdbXm33RIvLyEE2Q2Ya5LafDGjpZg9QENRzT2x3GazqTxjiMaz4CZc7E 96P8aNOWABTn6wWoNH3axQk1MNsMoW/DymJLpOECLN94VM4HvkHilxnJ/DRezSbQ KEJK2BastFSyw8SsDy9W2tiRwQp7Bwo+pV29iU000Gh6NTGV+Jv4APjBhNpUg2Fn 2d9GUawceRI= =yf03 -----END PGP SIGNATURE-----