From owner-freebsd-announce@freebsd.org Tue Aug 18 20:15:42 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DCBAC9BD6C8 for ; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id C279C7F1; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id C15361893; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150818201541.C15361893@freefall.freebsd.org> Date: Tue, 18 Aug 2015 20:15:41 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:12.netstat X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Aug 2015 20:15:42 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:12.netstat Errata Notice The FreeBSD Project Topic: Incorrect netstat(1) data handling on 32-bit systems Category: core Module: netstat Announced: 2015-08-18 Credits: Mark Johnston Affects: FreeBSD 10.2-RELEASE Corrected: 2015-07-31 00:21:41 UTC (stable/10, 10.2-STABLE) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RC3-p1) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RELEASE-p1) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The netstat(1) utility displays the contents of various network related data structures. II. Problem Description The netstat(1) utility incorrectly handles reported values on 32-bit systems. III. Impact Due to how netstat(1) processes IPSEC counters, the utility may produce incorrect output on 32-bit systems. IV. Workaround No workaround is available, however systems without IPSEC compiled into the kernel are not affected. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your present system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your present system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:12/netstat.patch # fetch https://security.FreeBSD.org/patches/EN-15:12/netstat.patch.asc # gpg --verify netstat.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r286099 releng/10.2/ r286901 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:12.netstat.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.7 (FreeBSD) iQIcBAEBCgAGBQJV05A1AAoJEO1n7NZdz2rnAzIQANyLdOOQhe9dHyAV4N5YKM3B Z/86dY/KIIViVb1uzkBASBNnkHlG+mCMOQpzX2x8yCPF4i7bIEfPa4r2Bzw9pvCF RWRKvZXERESh/RndQFhxcmJMAyYPq7MdK0IZzG53vinlMoSz2WTKj2vSR7t2jfo+ ObTfgdkqN/PZs/W+AQY8a4DMdxCLg1KCZiSpQRO7ea+4AxsI8qNgoytvG6HRno/z uGe6Ad82ZfysKgqe9JO4gvRTR77ebQAVSSr3qylQcOGHohy9tFHcI2FEAAqLJrQY b5DDLOawLRsQm0hwkLCTOZX2QvIFgz0gGRpvPcN9ZKValMc5DKQv36z3hOByK+3i dDHFG/Diy2JNP0tsKtW8IyyLvW2DAUoTs1nVaWMvLKkMUr+loOYvoaLdGT0xQP2d M6UT40mRMznfH/Gq/0DJFArsYcyB9YRl7rD0dy1HhqApogHQrTjsT+1vtBtpaTmv LHA77tHyzI0TxOvmx3hglj/z4BLZDPU6ydXr3zeOYBpLz5p02GKxHUc+JrmWBfOV Jep0+Fr2fYST5bGVtExNQV6cTlBZPnGR4JxJEUQA6a+FdyJcDuzOTNcs0YzwjuSC dIk5pdxI3nkc+zf9GZLXUdLcxXfo6jBUy0fSWkzirGzBfo0wxseE6cbxxTH7vumx CLGGmHiqxVuF/nP4ScHi =3aK1 -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Aug 18 20:15:42 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E5C6F9BD6C9 for ; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id C65EC7F2; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id C5B7E1895; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150818201541.C5B7E1895@freefall.freebsd.org> Date: Tue, 18 Aug 2015 20:15:41 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:13.vidcontrol X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Aug 2015 20:15:42 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:13.vidcontrol Errata Notice The FreeBSD Project Topic: Allow size argument to vidcontrol(1) for syscons(4) Category: core Module: vidcontrol Announced: 2015-08-18 Credits: Ed Maste Affects: FreeBSD 10.2-RELEASE Corrected: 2015-08-04 15:15:06 UTC (stable/10, 10.2-STABLE) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RC3-p1) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RELEASE-p1) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The vidcontrol(1) utility is used to set various options for the syscons(4) or vt(4) console driver, such as video mode, colors, cursor shape, screen output map, font, and screen saver timeout. The vidcontrol(1) utility allows specifying a font size and font file as arguments to the '-f' flag. When no size or file are specified, vidcontrol(1) the default font will be used. II. Problem Description The vidcontrol(1) does not properly allow specifying the font size when invoked from the command line. III. Impact The vidcontrol(1) utility will use the default font size, regardless of the size specified as an argument to the '-f' flag. IV. Workaround No workaround is available, but systems not using the vt(4) driver are not affected. V. Solution Perform one of the following: 1) Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your present system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your present system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:13/vidcontrol.patch # fetch https://security.FreeBSD.org/patches/EN-15:13/vidcontrol.patch.asc # gpg --verify vidcontrol.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r286291 releng/10.2/ r286901 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:13.vidcontrol.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.7 (FreeBSD) iQIcBAEBCgAGBQJV05A2AAoJEO1n7NZdz2rnUc0QAMiNBzG5yPZYN5yDzbKSzWAX /bHJNOhM2SBTHIHuUd/s1UjW2OW57IYyVLaF8BPjs8pXlQT6op3R2r/ZItfe/5xz dja6oBH74czaLRMigrxIT1SaJdSzlpnRbtJR4HMjGnA2f9Rbttl5S4j0vf6sy/6G fqgbKrston6WbTQudNkpwekaYbUStA4iVarIBfntbNmg7TvFZLl+yKbPvoQ3/Lxz pU1U55JNTQOYn+h1KaLm+p7pvEPM7g6q49ZsIaX3dXBIMB00GT9wwvZZPpvUNn+Q v+EUSvuIspaIhFb0Jng5gULQkJ5pRg/xDWZ71PcNW/F7hKf4Gt8NUdpmMO+k180X EQAS37q9hdSiYmktFx7O6tX//3vr/Zpvm0fZviBjqJwkNTqzRfa+NPojbDaDqolX /b/af9FZ0dBET4VrlNRp/XpJq9d5MCrRZKd2zmcdUwiOh06ZpQzh0tYjJCdM8d5P Ytdl36EIsCSBWm1vcXA9lHafMe+Ihuh3mOLPkWR+RL47jfHe7iuoyxKJGLBsK9T5 Pzq7Le9uSdrIIqZce7zCsZ59MpwizMOBO8/XejynTQXmmLuzc/DI+L6lWINGbFc7 pNYPSbcYB3iikdKe8LyQm2+Joiuu4EJJkiOiUSYYNT0o4yJYBTRntEwqnUJb8sO2 kMp/1tcmaQbOdW6t8iqw =/VcW -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Aug 18 20:15:42 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 02A569BD6CA for ; Tue, 18 Aug 2015 20:15:42 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id CA6377F3; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id C9C7D1897; Tue, 18 Aug 2015 20:15:41 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20150818201541.C9C7D1897@freefall.freebsd.org> Date: Tue, 18 Aug 2015 20:15:41 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:11.toolchain X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Aug 2015 20:15:42 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-15:11.toolchain Errata Notice The FreeBSD Project Topic: make(1) syntax errors when upgrading from 9.x and earlier Category: core Module: toolchain Announced: 2015-08-18 Credits: John Hein Affects: FreeBSD 10.2-RELEASE Corrected: 2015-08-13 22:29:26 UTC (stable/10, 10.2-STABLE) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RC3-p1) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RELEASE-p1) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The FreeBSD userland and kernel build system ensures a seamless upgrade path from the previous major FreeBSD version. During source-based upgrades, the build system must utilize several utilities on the running system in order to bootstrap the build toolchain, after which the bootstrapped utilities are used to produce the build output for the system upgrade. The make(1) utility was replaced with the NetBSD bmake(1) utility as of FreeBSD 10.0-RELEASE, which has several syntactical differences compared to the fmake(1) utility found in earlier FreeBSD releases. II. Problem Description A hard-coded make(1) invocation in the FreeBSD 10.2 sources produce warnings on FreeBSD versions earlier than 10.x due to a syntactical difference between the FreeBSD and NetBSD versions of make(1). The warnings may persist on FreeBSD 10.2-RELEASE or 10.2-STABLE if the system is configured to use fmake(1), by defining WITHOUT_BMAKE in src.conf(5). III. Impact The warnings produced have no known functional impact. Additionally, the warnings will not recur after the system is upgraded to 10.2-RELEASE or 10.2-STABLE, unless WITHOUT_BMAKE is defined in src.conf(5) as noted above. IV. Workaround No workaround is available, but systems using binary upgrades such as freebsd-update(8) are not affected. V. Solution Perform one of the following: 1) Update the system sources to stable/10 or releng/10.2 dated after the correction date prior to upgrading from FreeBSD 9.x or earlier. No addtional action is required. 2) To update your present system via a source code patch: a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-15:11/toolchain.patch # fetch https://security.FreeBSD.org/patches/EN-15:11/toolchain.patch.asc # gpg --verify toolchain.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/10/ r286746 releng/10.2/ r286901 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this Errata Notice is available at https://security.FreeBSD.org/advisories/FreeBSD-EN-15:11.toolchain.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.7 (FreeBSD) iQIcBAEBCgAGBQJV05A1AAoJEO1n7NZdz2rnSJEP/A1452UILdiWXytwy75nCktq a4vCmQ73gK1raY1SyFDzRppemiIeiDlsE3NTldNvMjw+itPkW/d/VJYIsUQimLxL dQvuAaWLKDK2MKjCUkl7isxBJPdcnnB12QLIZ5TS9ZzqPo7awFq91tL3TmAhwdmw mAikqUoOZilTC6j3wZp+2w4IjSrecN6dGdTutd9E8ahjy8BmNBax+hyPnbFTXGp4 s8Tpx3LhmPicvXh4ou3uHm0IbKFJF2B5Y8THTDF2SAZ5pyaltjg+o4JvW1lvaOFM XXp1XkGhfdkFj19FKeFUsT4BWLorqAnu9BqNJFlrxbotaPMMBJLbMEI2HqBVMa8a fu+loj9tlAMprWjKnl+GLcYrpIEmIPQzGHHO0k8ke1efQmsfLeBo1cdKyQV1M88u uwRBDkN08krEyun5QDeZwn35Kc//jeK14v465HRXt0gxztX+frt31UKNu7cTEuo9 ZqZbX5RUS85u/Z8WKhIBp9LWSgVdaB1v10mSb9kHMqZvckEqlozxr3h+/lOezpep rGCdnHPDEHaA5jvwX2WY3+Rb7hOvpzRw5UmBuGVfGp16HQALIwwMC0LM9hA2NnZf re3Rx4asssbyoLmp8akZjDsr3j/500/XM7enNvQcEc1ZQhK9k5W9SDg6cbEthEle Eiaq3eGZnWVBKiYftGcT =ryS+ -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Tue Aug 18 20:15:48 2015 Return-Path: Delivered-To: freebsd-announce@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6910D9BD6D9 for ; Tue, 18 Aug 2015 20:15:48 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 5ED34801; Tue, 18 Aug 2015 20:15:48 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1035) id 5E3B5189F; Tue, 18 Aug 2015 20:15:48 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20150818201548.5E3B5189F@freefall.freebsd.org> Date: Tue, 18 Aug 2015 20:15:48 +0000 (UTC) Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-15:20.expat X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.20 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Aug 2015 20:15:48 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:20.expat Security Advisory The FreeBSD Project Topic: Multiple integer overflows in expat (libbsdxml) XML parser Category: contrib Module: libbsdxml Announced: 2015-08-18 Affects: All supported versions of FreeBSD. Corrected: 2015-08-18 19:30:05 UTC (stable/10, 10.2-STABLE) 2015-08-18 19:30:35 UTC (releng/10.1, 10.1-RELEASE-p18) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RC3-p1) 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RELEASE-p1) 2015-08-18 19:30:05 UTC (stable/9, 9.3-STABLE) 2015-08-18 19:30:35 UTC (releng/9.3, 9.3-RELEASE-p23) CVE Name: CVE-2015-1283 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background Expat is an XML parser library written in C. It is a stream-oriented parser in which an application registers handlers for things the parser might find in the XML document (like start tags). The FreeBSD base system ships libexpat as libbsdxml for components that need to parse XML data. Some of these applications use the XML parser on trusted data from the kernel, for instance the geom(8) configuration utilities, while other applications, like tar(1), cpio(1), svnlite(1) and unbound-anchor(8), may use the XML parser on input from network or the user. II. Problem Description Multiple integer overflows have been discovered in the XML_GetBuffer() function in the expat library. III. Impact The integer overflows may be exploited by using specifically crafted XML data and lead to infinite loop, or a heap buffer overflow, which results in a Denial of Service condition, or enables remote attackers to execute arbitrary code. IV. Workaround No workaround is available, but the problem is only exploitable when the affected system needs to process data from an untrusted source. Because the library is used by many third party applications, we advise system administrators to check and make sure that they have the latest expat version as well, and restart all third party services, or reboot the system. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. A reboot is not required after updating the base system. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install A reboot is not required after updating the base system. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-15:20/expat.patch # fetch https://security.FreeBSD.org/patches/SA-15:20/expat.patch.asc # gpg --verify expat.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . The FreeBSD base system do not install daemons that uses the library, therefore, a reboot is not required after updating the base system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r286900 releng/9.3/ r286902 stable/10/ r286900 releng/10.1/ r286902 releng/10.2/ r286901 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.7 (FreeBSD) iQIcBAEBCgAGBQJV05AOAAoJEO1n7NZdz2rnRPUP/2L0kectacl6IWOOeGFt6QgG eRjZ6F53GqOYG3eW6tM71y+Vbeld+HkcMMgsckO4PM1vJg9AbKEJ56DmvGvFQepC TBBcbg++VHOB2jilKh/meOiF0sUqwcpSTwOdRREfWTAMXNS5te7kcpuykZoi4R1x LupCmRxQtM3taztw0AA/5AVRurmy+i6P9xuUnhGULyCcoi56VI1WvrpTk2KHbi7V T5f/Xwf2hPfznJVoxvPjY9YoOlD2Fql0Dc51clJOQ82l9VVD+lP4ISoJmwLqFPKA K4ZpiutMkoLda1er4lNaxsH4Ec7Oey4Dx2xpq1/JmQ9tP98Mtq4oaXNZAGminlET rNoLOWR72Gg+NEh7Y+Yuu0K3zFmzLLm1pMjYfuIUaseT2qY7CE+qwm58kG6NvC53 fF+BwofOSaVNX/uzQnbP0iMJbewKXpqNO21CkdaapZVG+sXn8BZF3S1QDAWPaNwV cJT9agijNG6pNUESNZcgY0ow/n4B8J+wWwA1KWzBgbedzj0yG8rsmulkCZEpt1hU 4uHR62Ktvd2IecoRn2gptA6SkpxHHJhzG8uKvDFq9vvzZko31rc3ttLI/Bb5P1QZ wqn1hp1sy9hEpoGxFQlYJj4msahR4P7vTt+0cN4dSVwwg08Xbq1TL4b077BR1ZbR ymv8Cnwn7Kg5NRBS2GBD =4h4f -----END PGP SIGNATURE-----