Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.0622.2 Security update for the Linux Kernel 18 February 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-0435 CVE-2022-0330 CVE-2022-0322 CVE-2021-45486 CVE-2021-45095 CVE-2021-44733 CVE-2021-43976 CVE-2021-43975 CVE-2021-39657 CVE-2021-39648 CVE-2021-33098 CVE-2021-28715 CVE-2021-28714 CVE-2021-28713 CVE-2021-28712 CVE-2021-28711 CVE-2021-4202 CVE-2021-4197 CVE-2021-4159 CVE-2021-4149 CVE-2021-4083 CVE-2021-4002 CVE-2021-3564 CVE-2021-0935 CVE-2021-0920 CVE-2020-27820 CVE-2019-15126 CVE-2018-25020 Reference: ESB-2022.0615 ESB-2022.0614 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220371-1 Comment: CVSS (Max): 8.1* CVE-2022-0435 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE * Not all CVSS available when published Revision History: February 18 2022: Change in the subject February 14 2022: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0371-1 Rating: important References: #1071995 #1124431 #1167162 #1169514 #1172073 #1177101 #1179599 #1184804 #1185377 #1186207 #1186222 #1187167 #1189305 #1189841 #1190358 #1190428 #1191229 #1191384 #1191731 #1192032 #1192267 #1192740 #1192845 #1192847 #1192877 #1192946 #1193306 #1193440 #1193442 #1193507 #1193575 #1193669 #1193727 #1193731 #1193767 #1193861 #1193864 #1193867 #1194001 #1194048 #1194087 #1194227 #1194302 #1194516 #1194529 #1194880 #1194888 #1194985 #1195254 Cross-References: CVE-2018-25020 CVE-2019-15126 CVE-2020-27820 CVE-2021-0920 CVE-2021-0935 CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 CVE-2021-28714 CVE-2021-28715 CVE-2021-33098 CVE-2021-3564 CVE-2021-39648 CVE-2021-39657 CVE-2021-4002 CVE-2021-4083 CVE-2021-4149 CVE-2021-4197 CVE-2021-4202 CVE-2021-43975 CVE-2021-43976 CVE-2021-44733 CVE-2021-45095 CVE-2021-45486 CVE-2022-0322 CVE-2022-0330 CVE-2022-0435 Affected Products: SUSE Linux Enterprise High Availability 12-SP4 SUSE Linux Enterprise High Performance Computing 12-SP4 SUSE Linux Enterprise Live Patching 12-SP4 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP4-LTSS SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server for SAP Applications 12-SP3 SUSE Linux Enterprise Server for SAP Applications 12-SP4 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 9 ______________________________________________________________________________ An update that solves 27 vulnerabilities and has 22 fixes is now available. Description: The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254). o CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc# 1194880). o CVE-2022-0322: Fixed SCTP issue with account stream padding length for reconf chunk (bsc#1194985). o CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087). o CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867). o CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc# 1193767). o CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847) o CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bsc#1192845) o CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc# 1194529). o CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302). o CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227). o CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001). o CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc# 1193727). o CVE-2021-4002: Fixed a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946) o CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc# 1193864). o CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). o CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207). o CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877) o CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442). o CVE-2021-28714: Fixed issue with xen/netback to add rx queue stall detection (XSA-392) (bsc#1193442). o CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440). o CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440). o CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440). o CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032). o CVE-2021-0920: Fixed use after free bug due to a race condition in unix_scm_to_skb of af_unix.c. This could have led to local escalation of privilege with System execution privileges needed (bnc#1193731). o CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device. (bsc#1179599) o CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka "Kr00k". (bsc#1167162) o CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575). The following non-security bugs were fixed: o Bluetooth: fix the erroneous flush_work() order (git-fixes). o Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731). o elfcore: fix building with clang (bsc#1169514). o fget: clarify and improve __fget_files() implementation (bsc#1193727). o hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507). o hv_netvsc: Set needed_headroom according to VF (bsc#1193507). o kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740). o kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable. o kernel-binary.spec: Define $image as rpm macro (bsc#1189841). o kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167). o kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge. o kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well (bsc#1189841). o kernel-cert-subpackage: Fix certificate location in scriptlets (bsc# 1189841). o kernel-source.spec: install-kernel-tools also required on 15.4 o kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). o kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). o livepatch: Avoid CPU hogging with cond_resched (bsc#1071995). o memstick: rtsx_usb_ms: fix UAF (bsc#1194516). o moxart: fix potential use-after-free on remove path (bsc#1194516). o net: Using proper atomic helper (bsc#1186222). o net: mana: Add RX fencing (bsc#1193507). o net: mana: Add XDP support (bsc#1193507). o net: mana: Allow setting the number of queues while the NIC is down (bsc# 1193507). o net: mana: Fix spelling mistake "calledd" -> "called" (bsc#1193507). o net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc# 1193507). o net: mana: Improve the HWC error handling (bsc#1193507). o net: mana: Support hibernation and kexec (bsc#1193507). o net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507). o objtool: Support Clang non-section symbols in ORC generation (bsc#1169514). o post.sh: detect /usr mountpoint too o recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267). o recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc# 1192267). o rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed. o rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804). o rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306) After usrmerge, vmlinux file is not named vmlinux-<version>, but simply vmlinux. And this is not reflected in STRIP_KEEP_SYMTAB we set. So fix this by removing the dash... o rpm/kernel-binary.spec: Use only non-empty certificates. o rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305) o rpm/kernel-source.rpmlintrc: ignore new include/config files In 5.13, since 0e0345b77ac4, config files have no longer .h suffix. Adapt the zero-length check. Based on Martin Liska's change. o rpm/kernel-source.spec.in: do some more for vanilla_only Make sure: * sources are NOT executable * env is not used as interpreter * timestamps are correct We do all this for normal kernel builds, but not for vanilla_only kernels (linux-next and vanilla). o rpm: fixup support gz and zst compression methods (bsc#1190428, bsc# 1190358). o rpm: use _rpmmacrodir (boo#1191384) o tty: hvc: replace BUG_ON() with negative return value (git-fixes). o vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888). o watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101). o watchdog: iTCO_wdt: Make ICH_RES_IO_SMI optional (bsc#1177101). o x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514). o xen/blkfront: do not take local copy of a request from the ring page (git-fixes). o xen/blkfront: do not trust the backend response data blindly (git-fixes). o xen/blkfront: read response from backend only once (git-fixes). o xen/netfront: disentangle tx_skb_freelist (git-fixes). o xen/netfront: do not read data from request on the ring page (git-fixes). o xen/netfront: do not trust the backend response data blindly (git-fixes). o xen/netfront: read response from backend only once (git-fixes). o xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes). o xfrm: fix MTU regression (bsc#1185377, bsc#1194048). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-371=1 o SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-371=1 o SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-371=1 o SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-371=1 o SUSE Linux Enterprise Live Patching 12-SP4: zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2022-371=1 o SUSE Linux Enterprise High Availability 12-SP4: zypper in -t patch SUSE-SLE-HA-12-SP4-2022-371=1 Package List: o SUSE OpenStack Cloud Crowbar 9 (noarch): kernel-devel-4.12.14-95.88.1 kernel-macros-4.12.14-95.88.1 kernel-source-4.12.14-95.88.1 o SUSE OpenStack Cloud Crowbar 9 (x86_64): kernel-default-4.12.14-95.88.1 kernel-default-base-4.12.14-95.88.1 kernel-default-base-debuginfo-4.12.14-95.88.1 kernel-default-debuginfo-4.12.14-95.88.1 kernel-default-debugsource-4.12.14-95.88.1 kernel-default-devel-4.12.14-95.88.1 kernel-default-devel-debuginfo-4.12.14-95.88.1 kernel-syms-4.12.14-95.88.1 o SUSE OpenStack Cloud 9 (noarch): kernel-devel-4.12.14-95.88.1 kernel-macros-4.12.14-95.88.1 kernel-source-4.12.14-95.88.1 o SUSE OpenStack Cloud 9 (x86_64): kernel-default-4.12.14-95.88.1 kernel-default-base-4.12.14-95.88.1 kernel-default-base-debuginfo-4.12.14-95.88.1 kernel-default-debuginfo-4.12.14-95.88.1 kernel-default-debugsource-4.12.14-95.88.1 kernel-default-devel-4.12.14-95.88.1 kernel-default-devel-debuginfo-4.12.14-95.88.1 kernel-syms-4.12.14-95.88.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): kernel-default-4.12.14-95.88.1 kernel-default-base-4.12.14-95.88.1 kernel-default-base-debuginfo-4.12.14-95.88.1 kernel-default-debuginfo-4.12.14-95.88.1 kernel-default-debugsource-4.12.14-95.88.1 kernel-default-devel-4.12.14-95.88.1 kernel-syms-4.12.14-95.88.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64): kernel-default-devel-debuginfo-4.12.14-95.88.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (noarch): kernel-devel-4.12.14-95.88.1 kernel-macros-4.12.14-95.88.1 kernel-source-4.12.14-95.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64): kernel-default-4.12.14-95.88.1 kernel-default-base-4.12.14-95.88.1 kernel-default-base-debuginfo-4.12.14-95.88.1 kernel-default-debuginfo-4.12.14-95.88.1 kernel-default-debugsource-4.12.14-95.88.1 kernel-default-devel-4.12.14-95.88.1 kernel-syms-4.12.14-95.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (x86_64): kernel-default-devel-debuginfo-4.12.14-95.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (noarch): kernel-devel-4.12.14-95.88.1 kernel-macros-4.12.14-95.88.1 kernel-source-4.12.14-95.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (s390x): kernel-default-man-4.12.14-95.88.1 o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64): kernel-default-kgraft-4.12.14-95.88.1 kernel-default-kgraft-devel-4.12.14-95.88.1 kgraft-patch-4_12_14-95_88-default-1-6.5.1 o SUSE Linux Enterprise High Availability 12-SP4 (ppc64le s390x x86_64): cluster-md-kmp-default-4.12.14-95.88.1 cluster-md-kmp-default-debuginfo-4.12.14-95.88.1 dlm-kmp-default-4.12.14-95.88.1 dlm-kmp-default-debuginfo-4.12.14-95.88.1 gfs2-kmp-default-4.12.14-95.88.1 gfs2-kmp-default-debuginfo-4.12.14-95.88.1 kernel-default-debuginfo-4.12.14-95.88.1 kernel-default-debugsource-4.12.14-95.88.1 ocfs2-kmp-default-4.12.14-95.88.1 ocfs2-kmp-default-debuginfo-4.12.14-95.88.1 References: o https://www.suse.com/security/cve/CVE-2018-25020.html o https://www.suse.com/security/cve/CVE-2019-15126.html o https://www.suse.com/security/cve/CVE-2020-27820.html o https://www.suse.com/security/cve/CVE-2021-0920.html o https://www.suse.com/security/cve/CVE-2021-0935.html o https://www.suse.com/security/cve/CVE-2021-28711.html o https://www.suse.com/security/cve/CVE-2021-28712.html o https://www.suse.com/security/cve/CVE-2021-28713.html o https://www.suse.com/security/cve/CVE-2021-28714.html o https://www.suse.com/security/cve/CVE-2021-28715.html o https://www.suse.com/security/cve/CVE-2021-33098.html o https://www.suse.com/security/cve/CVE-2021-3564.html o https://www.suse.com/security/cve/CVE-2021-39648.html o https://www.suse.com/security/cve/CVE-2021-39657.html o https://www.suse.com/security/cve/CVE-2021-4002.html o https://www.suse.com/security/cve/CVE-2021-4083.html o https://www.suse.com/security/cve/CVE-2021-4149.html o https://www.suse.com/security/cve/CVE-2021-4197.html o https://www.suse.com/security/cve/CVE-2021-4202.html o https://www.suse.com/security/cve/CVE-2021-43975.html o https://www.suse.com/security/cve/CVE-2021-43976.html o https://www.suse.com/security/cve/CVE-2021-44733.html o https://www.suse.com/security/cve/CVE-2021-45095.html o https://www.suse.com/security/cve/CVE-2021-45486.html o https://www.suse.com/security/cve/CVE-2022-0322.html o https://www.suse.com/security/cve/CVE-2022-0330.html o https://www.suse.com/security/cve/CVE-2022-0435.html o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1124431 o https://bugzilla.suse.com/1167162 o https://bugzilla.suse.com/1169514 o https://bugzilla.suse.com/1172073 o https://bugzilla.suse.com/1177101 o https://bugzilla.suse.com/1179599 o https://bugzilla.suse.com/1184804 o https://bugzilla.suse.com/1185377 o https://bugzilla.suse.com/1186207 o https://bugzilla.suse.com/1186222 o https://bugzilla.suse.com/1187167 o https://bugzilla.suse.com/1189305 o https://bugzilla.suse.com/1189841 o https://bugzilla.suse.com/1190358 o https://bugzilla.suse.com/1190428 o https://bugzilla.suse.com/1191229 o https://bugzilla.suse.com/1191384 o https://bugzilla.suse.com/1191731 o https://bugzilla.suse.com/1192032 o https://bugzilla.suse.com/1192267 o https://bugzilla.suse.com/1192740 o https://bugzilla.suse.com/1192845 o https://bugzilla.suse.com/1192847 o https://bugzilla.suse.com/1192877 o https://bugzilla.suse.com/1192946 o https://bugzilla.suse.com/1193306 o https://bugzilla.suse.com/1193440 o https://bugzilla.suse.com/1193442 o https://bugzilla.suse.com/1193507 o https://bugzilla.suse.com/1193575 o https://bugzilla.suse.com/1193669 o https://bugzilla.suse.com/1193727 o https://bugzilla.suse.com/1193731 o https://bugzilla.suse.com/1193767 o https://bugzilla.suse.com/1193861 o https://bugzilla.suse.com/1193864 o https://bugzilla.suse.com/1193867 o https://bugzilla.suse.com/1194001 o https://bugzilla.suse.com/1194048 o https://bugzilla.suse.com/1194087 o https://bugzilla.suse.com/1194227 o https://bugzilla.suse.com/1194302 o https://bugzilla.suse.com/1194516 o https://bugzilla.suse.com/1194529 o https://bugzilla.suse.com/1194880 o https://bugzilla.suse.com/1194888 o https://bugzilla.suse.com/1194985 o https://bugzilla.suse.com/1195254 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYg8yL+NLKJtyKPYoAQgorBAAovT4h4rSAu213rA5joKIkchMiSxqATJF fvz+8jQpwYTJSMp3FxPwi4whn7rpmJ072LVPrIoOk+NWAjxGECGEs5xSYjTkrjXL uLqD2Nyaa1w0AwP8FeiKL8qmlqOoEe3CTRCSTTD2oF9jOhp0w8xB45MP+Qag8KDC k+EfvpvpnpCIaiZokZiFsk3MZls+MwmUt8fPJIU8CzHPJFpiKC22FvwWxqr6t8wS 2q6NwhLg44uOGhfLE2qjvQgkFKZrxYxz3OKUspQ/1StQp3KgjPZ733JvxY/H8Tug AfZv0j6n2banupf+lWnEMyjHCLEoFb78yTS3PNgMvIuytTQyHP4M6bFManhOuP8L 8dH1YKD4fasVetTswApGwMHkPLXRyTXKUjSsqJHAhkCwu9sdHOnWbq/PSQM5YL2E Ep9t1UeMUrYHZeJ11vcfjy9ru5P68hZsKrKqNxUZZLzOVfMkBiD/fI1PDH9EQ6G7 FY9fpNJrG1vWdlDujECdq9KNS79RcFoYQB5DqANHaNU9fyCSlZ3/4cLkYa0+fTGf tgTXnQdwZQDOqADtCMY/HgAXs2d2/MDgVMp/FMt591rYs25B7FskywtTUpCJsWRg yFdBLqH21uJmCy+f3lHBmIebK+WByJkDRoAmzYJKpqwdW3SVds4eHSfF0x32V0f4 MCqM8c4XBHk= =wqh1 -----END PGP SIGNATURE-----