-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2016.1553.2
             SUSE Security Update: Security update for mariadb
                               23 June 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          mariadb
Publisher:        SUSE
Operating System: SUSE
Impact/Access:    Execute Arbitrary Code/Commands -- Existing Account      
                  Modify Arbitrary Files          -- Remote/Unauthenticated
                  Denial of Service               -- Existing Account      
                  Access Confidential Data        -- Existing Account      
Resolution:       Patch/Upgrade
CVE Names:        CVE-2016-2047 CVE-2016-0668 CVE-2016-0666
                  CVE-2016-0655 CVE-2016-0651 CVE-2016-0650
                  CVE-2016-0649 CVE-2016-0648 CVE-2016-0647
                  CVE-2016-0646 CVE-2016-0644 CVE-2016-0643
                  CVE-2016-0642 CVE-2016-0641 CVE-2016-0640
                  CVE-2016-0616 CVE-2016-0609 CVE-2016-0608
                  CVE-2016-0606 CVE-2016-0600 CVE-2016-0598
                  CVE-2016-0597 CVE-2016-0596 CVE-2016-0546
                  CVE-2016-0505  

Reference:        ASB-2016.0043
                  ASB-2016.0004
                  ESB-2016.0183

Comment: This bulletin contains two (2) SUSE security advisories.

Revision History: June 23 2016: Added operating system tag
                  June 20 2016: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for mariadb
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1619-1
Rating:             important
References:         #960961 #961935 #963806 #980904 
Cross-References:   CVE-2016-0505 CVE-2016-0546 CVE-2016-0596
                    CVE-2016-0597 CVE-2016-0598 CVE-2016-0600
                    CVE-2016-0606 CVE-2016-0608 CVE-2016-0609
                    CVE-2016-0616 CVE-2016-0640 CVE-2016-0641
                    CVE-2016-0642 CVE-2016-0643 CVE-2016-0644
                    CVE-2016-0646 CVE-2016-0647 CVE-2016-0648
                    CVE-2016-0649 CVE-2016-0650 CVE-2016-0651
                    CVE-2016-0655 CVE-2016-0666 CVE-2016-0668
                    CVE-2016-2047
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that fixes 25 vulnerabilities is now available.

Description:

   mariadb was updated to version 10.0.25 to fix 25 security issues.

   These security issues were fixed:
   - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Options
     (bsc#980904).
   - CVE-2016-0546: Unspecified vulnerability allowed local users to affect
     confidentiality, integrity, and availability via unknown vectors related
     to Client (bsc#980904).
   - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to InnoDB
     (bsc#980904).
   - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated
     users to affect integrity via unknown vectors related to encryption
     (bsc#980904).
   - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to UDF (bsc#980904).
   - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to privileges
     (bsc#980904).
   - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0640: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to DML (bsc#980904).
   - CVE-2016-0641: Unspecified vulnerability allowed local users to affect
     confidentiality and availability via vectors related to MyISAM
     (bsc#980904).
   - CVE-2016-0642: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to Federated (bsc#980904).
   - CVE-2016-0643: Unspecified vulnerability allowed local users to affect
     confidentiality via vectors related to DML (bsc#980904).
   - CVE-2016-0644: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DDL (bsc#980904).
   - CVE-2016-0646: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DML (bsc#980904).
   - CVE-2016-0647: Unspecified vulnerability allowed local users to affect
     availability via vectors related to FTS (bsc#980904).
   - CVE-2016-0648: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0649: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0650: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Replication (bsc#980904).
   - CVE-2016-0651: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Optimizer (bsc#980904).
   - CVE-2016-0655: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-0666: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Security: Privileges (bsc#980904).
   - CVE-2016-0668: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-2047: The ssl_verify_server_cert function in
     sql-common/client.c did not properly verify that the server hostname
     matches a domain name in the subject's Common Name (CN) or
     subjectAltName field of the X.509 certificate, which allowed
     man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in
     a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com
     (bsc#963806).

   These non-security issues were fixed:
   - bsc#960961: Use 'plugin-load-add' instead of 'plugin-load' in
     default_plugins.cnf. It contained 'plugin-load' options which caused
     that only last plugin was actually loaded ('plugin-load' overrides the
     previous 'plugin-load')
   - bsc#961935: Remove the leftovers of "openSUSE" string in the
     '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12:

      zypper in -t patch SUSE-SLE-WE-12-2016-964=1

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2016-964=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2016-964=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2016-964=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12 (x86_64):

      libmysqlclient_r18-10.0.25-20.6.1
      libmysqlclient_r18-32bit-10.0.25-20.6.1
      mariadb-debuginfo-10.0.25-20.6.1
      mariadb-debugsource-10.0.25-20.6.1

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      libmysqlclient-devel-10.0.25-20.6.1
      libmysqlclient_r18-10.0.25-20.6.1
      libmysqld-devel-10.0.25-20.6.1
      libmysqld18-10.0.25-20.6.1
      libmysqld18-debuginfo-10.0.25-20.6.1
      mariadb-debuginfo-10.0.25-20.6.1
      mariadb-debugsource-10.0.25-20.6.1

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      libmysqlclient18-10.0.25-20.6.1
      libmysqlclient18-debuginfo-10.0.25-20.6.1
      mariadb-10.0.25-20.6.1
      mariadb-client-10.0.25-20.6.1
      mariadb-client-debuginfo-10.0.25-20.6.1
      mariadb-debuginfo-10.0.25-20.6.1
      mariadb-debugsource-10.0.25-20.6.1
      mariadb-errormessages-10.0.25-20.6.1
      mariadb-tools-10.0.25-20.6.1
      mariadb-tools-debuginfo-10.0.25-20.6.1

   - SUSE Linux Enterprise Server 12 (s390x x86_64):

      libmysqlclient18-32bit-10.0.25-20.6.1
      libmysqlclient18-debuginfo-32bit-10.0.25-20.6.1

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      libmysqlclient18-10.0.25-20.6.1
      libmysqlclient18-32bit-10.0.25-20.6.1
      libmysqlclient18-debuginfo-10.0.25-20.6.1
      libmysqlclient18-debuginfo-32bit-10.0.25-20.6.1
      libmysqlclient_r18-10.0.25-20.6.1
      libmysqlclient_r18-32bit-10.0.25-20.6.1
      mariadb-10.0.25-20.6.1
      mariadb-client-10.0.25-20.6.1
      mariadb-client-debuginfo-10.0.25-20.6.1
      mariadb-debuginfo-10.0.25-20.6.1
      mariadb-debugsource-10.0.25-20.6.1
      mariadb-errormessages-10.0.25-20.6.1


References:

   https://www.suse.com/security/cve/CVE-2016-0505.html
   https://www.suse.com/security/cve/CVE-2016-0546.html
   https://www.suse.com/security/cve/CVE-2016-0596.html
   https://www.suse.com/security/cve/CVE-2016-0597.html
   https://www.suse.com/security/cve/CVE-2016-0598.html
   https://www.suse.com/security/cve/CVE-2016-0600.html
   https://www.suse.com/security/cve/CVE-2016-0606.html
   https://www.suse.com/security/cve/CVE-2016-0608.html
   https://www.suse.com/security/cve/CVE-2016-0609.html
   https://www.suse.com/security/cve/CVE-2016-0616.html
   https://www.suse.com/security/cve/CVE-2016-0640.html
   https://www.suse.com/security/cve/CVE-2016-0641.html
   https://www.suse.com/security/cve/CVE-2016-0642.html
   https://www.suse.com/security/cve/CVE-2016-0643.html
   https://www.suse.com/security/cve/CVE-2016-0644.html
   https://www.suse.com/security/cve/CVE-2016-0646.html
   https://www.suse.com/security/cve/CVE-2016-0647.html
   https://www.suse.com/security/cve/CVE-2016-0648.html
   https://www.suse.com/security/cve/CVE-2016-0649.html
   https://www.suse.com/security/cve/CVE-2016-0650.html
   https://www.suse.com/security/cve/CVE-2016-0651.html
   https://www.suse.com/security/cve/CVE-2016-0655.html
   https://www.suse.com/security/cve/CVE-2016-0666.html
   https://www.suse.com/security/cve/CVE-2016-0668.html
   https://www.suse.com/security/cve/CVE-2016-2047.html
   https://bugzilla.suse.com/960961
   https://bugzilla.suse.com/961935
   https://bugzilla.suse.com/963806
   https://bugzilla.suse.com/980904

- ---

   SUSE Security Update: Security update for mariadb
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1620-1
Rating:             important
References:         #961935 #963806 #963810 #970287 #970295 #980904 
                    
Cross-References:   CVE-2016-0505 CVE-2016-0546 CVE-2016-0596
                    CVE-2016-0597 CVE-2016-0598 CVE-2016-0600
                    CVE-2016-0606 CVE-2016-0608 CVE-2016-0609
                    CVE-2016-0616 CVE-2016-0640 CVE-2016-0641
                    CVE-2016-0642 CVE-2016-0643 CVE-2016-0644
                    CVE-2016-0646 CVE-2016-0647 CVE-2016-0648
                    CVE-2016-0649 CVE-2016-0650 CVE-2016-0651
                    CVE-2016-0655 CVE-2016-0666 CVE-2016-0668
                    CVE-2016-2047
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that fixes 25 vulnerabilities is now available.

Description:

   mariadb was updated to version 10.0.25 to fix 25 security issues.

   These security issues were fixed:
   - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Options
     (bsc#980904).
   - CVE-2016-0546: Unspecified vulnerability allowed local users to affect
     confidentiality, integrity, and availability via unknown vectors related
     to Client (bsc#980904).
   - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to InnoDB
     (bsc#980904).
   - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated
     users to affect integrity via unknown vectors related to encryption
     (bsc#980904).
   - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to UDF (bsc#980904).
   - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to privileges
     (bsc#980904).
   - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0640: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to DML (bsc#980904).
   - CVE-2016-0641: Unspecified vulnerability allowed local users to affect
     confidentiality and availability via vectors related to MyISAM
     (bsc#980904).
   - CVE-2016-0642: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to Federated (bsc#980904).
   - CVE-2016-0643: Unspecified vulnerability allowed local users to affect
     confidentiality via vectors related to DML (bsc#980904).
   - CVE-2016-0644: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DDL (bsc#980904).
   - CVE-2016-0646: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DML (bsc#980904).
   - CVE-2016-0647: Unspecified vulnerability allowed local users to affect
     availability via vectors related to FTS (bsc#980904).
   - CVE-2016-0648: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0649: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0650: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Replication (bsc#980904).
   - CVE-2016-0651: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Optimizer (bsc#980904).
   - CVE-2016-0655: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-0666: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Security: Privileges (bsc#980904).
   - CVE-2016-0668: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-2047: The ssl_verify_server_cert function in
     sql-common/client.c did not properly verify that the server hostname
     matches a domain name in the subject's Common Name (CN) or
     subjectAltName field of the X.509 certificate, which allowed
     man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in
     a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com
     (bsc#963806).

   These non-security issues were fixed:
   - bsc#961935: Remove the leftovers of "openSUSE" string in the
     '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options
   - bsc#970287: remove ha_tokudb.so plugin and tokuft_logprint and
     tokuftdump binaries as TokuDB storage engine requires the jemalloc
     library that isn't present in SLE-12-SP1
   - bsc#970295: Fix the leftovers of "logrotate.d/mysql" string in the
     logrotate error message. Occurrences of this string were changed to
     "logrotate.d/mariadb"
   - bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options
     * add '/etc/my.cnf.d/error_log.conf' that specifies 'log-error =
       /var/log/mysql/mysqld.log'. If no path is set, the error log is
       written to '/var/lib/mysql/$HOSTNAME.err', which is not picked up by
       logrotate.
     * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that 'LOAD
       DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with files
       in the directory specified by 'secure-file-priv'
       option (='/var/lib/mysql-files').


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2016-963=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-963=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-963=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-963=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      libmysqlclient_r18-10.0.25-6.1
      libmysqlclient_r18-32bit-10.0.25-6.1
      mariadb-debuginfo-10.0.25-6.1
      mariadb-debugsource-10.0.25-6.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      libmysqlclient-devel-10.0.25-6.1
      libmysqlclient_r18-10.0.25-6.1
      libmysqld-devel-10.0.25-6.1
      libmysqld18-10.0.25-6.1
      libmysqld18-debuginfo-10.0.25-6.1
      mariadb-debuginfo-10.0.25-6.1
      mariadb-debugsource-10.0.25-6.1

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      libmysqlclient18-10.0.25-6.1
      libmysqlclient18-debuginfo-10.0.25-6.1
      mariadb-10.0.25-6.1
      mariadb-client-10.0.25-6.1
      mariadb-client-debuginfo-10.0.25-6.1
      mariadb-debuginfo-10.0.25-6.1
      mariadb-debugsource-10.0.25-6.1
      mariadb-errormessages-10.0.25-6.1
      mariadb-tools-10.0.25-6.1
      mariadb-tools-debuginfo-10.0.25-6.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):

      libmysqlclient18-32bit-10.0.25-6.1
      libmysqlclient18-debuginfo-32bit-10.0.25-6.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      libmysqlclient18-10.0.25-6.1
      libmysqlclient18-32bit-10.0.25-6.1
      libmysqlclient18-debuginfo-10.0.25-6.1
      libmysqlclient18-debuginfo-32bit-10.0.25-6.1
      libmysqlclient_r18-10.0.25-6.1
      libmysqlclient_r18-32bit-10.0.25-6.1
      mariadb-10.0.25-6.1
      mariadb-client-10.0.25-6.1
      mariadb-client-debuginfo-10.0.25-6.1
      mariadb-debuginfo-10.0.25-6.1
      mariadb-debugsource-10.0.25-6.1
      mariadb-errormessages-10.0.25-6.1


References:

   https://www.suse.com/security/cve/CVE-2016-0505.html
   https://www.suse.com/security/cve/CVE-2016-0546.html
   https://www.suse.com/security/cve/CVE-2016-0596.html
   https://www.suse.com/security/cve/CVE-2016-0597.html
   https://www.suse.com/security/cve/CVE-2016-0598.html
   https://www.suse.com/security/cve/CVE-2016-0600.html
   https://www.suse.com/security/cve/CVE-2016-0606.html
   https://www.suse.com/security/cve/CVE-2016-0608.html
   https://www.suse.com/security/cve/CVE-2016-0609.html
   https://www.suse.com/security/cve/CVE-2016-0616.html
   https://www.suse.com/security/cve/CVE-2016-0640.html
   https://www.suse.com/security/cve/CVE-2016-0641.html
   https://www.suse.com/security/cve/CVE-2016-0642.html
   https://www.suse.com/security/cve/CVE-2016-0643.html
   https://www.suse.com/security/cve/CVE-2016-0644.html
   https://www.suse.com/security/cve/CVE-2016-0646.html
   https://www.suse.com/security/cve/CVE-2016-0647.html
   https://www.suse.com/security/cve/CVE-2016-0648.html
   https://www.suse.com/security/cve/CVE-2016-0649.html
   https://www.suse.com/security/cve/CVE-2016-0650.html
   https://www.suse.com/security/cve/CVE-2016-0651.html
   https://www.suse.com/security/cve/CVE-2016-0655.html
   https://www.suse.com/security/cve/CVE-2016-0666.html
   https://www.suse.com/security/cve/CVE-2016-0668.html
   https://www.suse.com/security/cve/CVE-2016-2047.html
   https://bugzilla.suse.com/961935
   https://bugzilla.suse.com/963806
   https://bugzilla.suse.com/963810
   https://bugzilla.suse.com/970287
   https://bugzilla.suse.com/970295
   https://bugzilla.suse.com/980904

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qpxb
-----END PGP SIGNATURE-----