Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0357 Important: Red Hat Satellite 6 security, bug fix, and enhancement update 6 February 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Satellite 6 Publisher: Red Hat Operating System: Red Hat Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-1000111 Reference: ESB-2016.2292 Original Bulletin: https://access.redhat.com/errata/RHSA-2018:0273 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Satellite 6 security, bug fix, and enhancement update Advisory ID: RHSA-2018:0273-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2018:0273 Issue date: 2018-02-05 CVE Names: CVE-2016-1000111 ===================================================================== 1. Summary: An update is now available for Red Hat Satellite 6.2 for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Satellite 6.2 - noarch, x86_64 Red Hat Satellite Capsule 6.2 - noarch, x86_64 3. Description: Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Security Fix(es): * It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000111) Red Hat would like to thank Scott Geary (VendHQ) for reporting this issue. This update fixes the following bugs: * Upgrades from Satellite 6.2 to Satellite 6.3 were failing due to the use of certificates with custom authorities. These upgrade paths now work. (BZ#1523880, BZ#1527963) * Additional tooling is provided to support data validation when upgrading from Satellite 6.2 to Satellite 6.3. (BZ#1519904) * Several memory usage bugs in goferd and qpid have been resolved. (BZ#1319165, BZ#1318015, BZ#1492355, BZ#1491160, BZ#1440235) * The performance of Puppet reporting and errata applicability has been improved. (BZ#1465146, BZ#1482204) * Upgrading from 6.2.10 to 6.2.11 without correctly stopping services can cause the upgrade to fail on removing qpid data. This case is now handled properly. (BZ#1482539) * The cipher suites for the Puppet server can now be configured by the installation process. (BZ#1491363) * The default cipher suite for the Apache server is now more secure by default. (BZ#1467434) * The Pulp server contained in Satellite has been enhanced to better handle concurrent processing of errata applicability for a single host and syncing Puppet repositories. (BZ#1515195, BZ#1421594) * VDC subscriptions create guest pools which are for a single host only. Administrators were attaching these pools to activation keys which was incorrect. The ability to do this has been disabled. (BZ#1369189) * Satellite was not susceptible to RHSA-2016:1978 but security scanners would incorrectly flag this as an issue. The package from this errata is now delivered in the Satellite channel to avoid these false positives. (BZ#1497337) * OpenScap report parsing resulted in a memory leak. This leak has been fixed. (BZ#1454743) * The validation on the length of names for docker containers and repositories was too restrictive. Names can now be longer. (BZ#1424689) Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For this update to take effect, Red Hat Satellite must be restarted ("/usr/sbin/rhn-satellite restart"). 5. Bugs fixed (https://bugzilla.redhat.com/): 1319165 - goferd close_wait leak and occasional segfault when qpidd restarted 1357345 - CVE-2016-1000111 Python Twisted: sets environmental variable based on user supplied Proxy request header 1369189 - Cannot attach VDC Guest subscription to an Activation Key. 1421594 - Possible race condition when sync multiple puppet repos at the same time 1424689 - Docker upstream repository name length limit 1440235 - candlepin event listener does not acknowledge every 100th message 1454743 - foreman-proxy memory leak when processing OpenScap report 1465146 - fetching list of applicable errata is slow with if lots of hosts need lots of errata 1482204 - Puppet reports recalculate all statuses (including errata status) 1482539 - Upgrade of Satellite to 6.2.11 error on removal of qpid dat2 directory 1491160 - qdrouterd segfault when processing bursts of goferd requests 1491363 - Puppet vhost should allow setting SSLProtocols and SSLCipherSuite using parameters 1492355 - sporadic deadlock of qdrouterd on bursts of goferd (dis)connection requests 1497337 - RHSA-2016:1978 (python-twisted-web-12.1.0-5.el7_2.x86_64.rpm) is missing from rhel-7-server-satellite-6.2-rpms repo 1515195 - generate errata applicability task occasionally raises duplicatekey error [6.2.z] 1519904 - [RFE] Allow running pre 2.x DB data validation step independently via cpdb 1531609 - undefined method 'value' in 12-check_capsule_tar.rb when running satellite-installer 6. Package List: Red Hat Satellite Capsule 6.2: Source: foreman-1.11.0.86-1.el6sat.src.rpm foreman-installer-1.11.0.18-1.el6sat.src.rpm katello-3.0.0-33.el6sat.src.rpm katello-installer-base-3.0.0.101-1.el6sat.src.rpm pulp-2.8.7.18-1.el6sat.src.rpm pulp-puppet-2.8.7.2-1.el6sat.src.rpm qpid-dispatch-0.4-27.el6sat.src.rpm qpid-proton-0.9-21.el6.src.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el6sat.src.rpm satellite-6.2.14-4.0.el6sat.src.rpm noarch: foreman-debug-1.11.0.86-1.el6sat.noarch.rpm foreman-installer-1.11.0.18-1.el6sat.noarch.rpm foreman-installer-katello-3.0.0.101-1.el6sat.noarch.rpm katello-capsule-3.0.0-33.el6sat.noarch.rpm katello-debug-3.0.0-33.el6sat.noarch.rpm katello-installer-base-3.0.0.101-1.el6sat.noarch.rpm katello-service-3.0.0-33.el6sat.noarch.rpm pulp-admin-client-2.8.7.18-1.el6sat.noarch.rpm pulp-nodes-child-2.8.7.18-1.el6sat.noarch.rpm pulp-nodes-common-2.8.7.18-1.el6sat.noarch.rpm pulp-nodes-parent-2.8.7.18-1.el6sat.noarch.rpm pulp-puppet-admin-extensions-2.8.7.2-1.el6sat.noarch.rpm pulp-puppet-plugins-2.8.7.2-1.el6sat.noarch.rpm pulp-selinux-2.8.7.18-1.el6sat.noarch.rpm pulp-server-2.8.7.18-1.el6sat.noarch.rpm python-pulp-agent-lib-2.8.7.18-1.el6sat.noarch.rpm python-pulp-bindings-2.8.7.18-1.el6sat.noarch.rpm python-pulp-client-lib-2.8.7.18-1.el6sat.noarch.rpm python-pulp-common-2.8.7.18-1.el6sat.noarch.rpm python-pulp-oid_validation-2.8.7.18-1.el6sat.noarch.rpm python-pulp-puppet-common-2.8.7.2-1.el6sat.noarch.rpm python-pulp-repoauth-2.8.7.18-1.el6sat.noarch.rpm python-pulp-streamer-2.8.7.18-1.el6sat.noarch.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el6sat.noarch.rpm satellite-capsule-6.2.14-4.0.el6sat.noarch.rpm satellite-debug-tools-6.2.14-4.0.el6sat.noarch.rpm x86_64: libqpid-dispatch-0.4-27.el6sat.x86_64.rpm python-qpid-proton-0.9-21.el6.x86_64.rpm qpid-dispatch-debuginfo-0.4-27.el6sat.x86_64.rpm qpid-dispatch-router-0.4-27.el6sat.x86_64.rpm qpid-dispatch-tools-0.4-27.el6sat.x86_64.rpm qpid-proton-c-0.9-21.el6.x86_64.rpm qpid-proton-debuginfo-0.9-21.el6.x86_64.rpm Red Hat Satellite 6.2: Source: candlepin-0.9.54.26-1.el6.src.rpm foreman-1.11.0.86-1.el6sat.src.rpm foreman-installer-1.11.0.18-1.el6sat.src.rpm katello-3.0.0-33.el6sat.src.rpm katello-installer-base-3.0.0.101-1.el6sat.src.rpm pulp-2.8.7.18-1.el6sat.src.rpm pulp-puppet-2.8.7.2-1.el6sat.src.rpm qpid-dispatch-0.4-27.el6sat.src.rpm qpid-proton-0.9-21.el6.src.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el6sat.src.rpm satellite-6.2.14-4.0.el6sat.src.rpm tfm-rubygem-foreman_theme_satellite-0.1.47.2-1.el6sat.src.rpm tfm-rubygem-katello-3.0.0.162-1.el6sat.src.rpm noarch: candlepin-0.9.54.26-1.el6.noarch.rpm candlepin-selinux-0.9.54.26-1.el6.noarch.rpm foreman-1.11.0.86-1.el6sat.noarch.rpm foreman-compute-1.11.0.86-1.el6sat.noarch.rpm foreman-debug-1.11.0.86-1.el6sat.noarch.rpm foreman-ec2-1.11.0.86-1.el6sat.noarch.rpm foreman-gce-1.11.0.86-1.el6sat.noarch.rpm foreman-installer-1.11.0.18-1.el6sat.noarch.rpm foreman-installer-katello-3.0.0.101-1.el6sat.noarch.rpm foreman-libvirt-1.11.0.86-1.el6sat.noarch.rpm foreman-openstack-1.11.0.86-1.el6sat.noarch.rpm foreman-ovirt-1.11.0.86-1.el6sat.noarch.rpm foreman-postgresql-1.11.0.86-1.el6sat.noarch.rpm foreman-rackspace-1.11.0.86-1.el6sat.noarch.rpm foreman-vmware-1.11.0.86-1.el6sat.noarch.rpm katello-3.0.0-33.el6sat.noarch.rpm katello-capsule-3.0.0-33.el6sat.noarch.rpm katello-common-3.0.0-33.el6sat.noarch.rpm katello-debug-3.0.0-33.el6sat.noarch.rpm katello-installer-base-3.0.0.101-1.el6sat.noarch.rpm katello-service-3.0.0-33.el6sat.noarch.rpm pulp-admin-client-2.8.7.18-1.el6sat.noarch.rpm pulp-puppet-admin-extensions-2.8.7.2-1.el6sat.noarch.rpm pulp-puppet-plugins-2.8.7.2-1.el6sat.noarch.rpm pulp-puppet-tools-2.8.7.2-1.el6sat.noarch.rpm pulp-selinux-2.8.7.18-1.el6sat.noarch.rpm pulp-server-2.8.7.18-1.el6sat.noarch.rpm python-pulp-agent-lib-2.8.7.18-1.el6sat.noarch.rpm python-pulp-bindings-2.8.7.18-1.el6sat.noarch.rpm python-pulp-client-lib-2.8.7.18-1.el6sat.noarch.rpm python-pulp-common-2.8.7.18-1.el6sat.noarch.rpm python-pulp-oid_validation-2.8.7.18-1.el6sat.noarch.rpm python-pulp-puppet-common-2.8.7.2-1.el6sat.noarch.rpm python-pulp-repoauth-2.8.7.18-1.el6sat.noarch.rpm python-pulp-streamer-2.8.7.18-1.el6sat.noarch.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el6sat.noarch.rpm satellite-6.2.14-4.0.el6sat.noarch.rpm satellite-capsule-6.2.14-4.0.el6sat.noarch.rpm satellite-cli-6.2.14-4.0.el6sat.noarch.rpm satellite-debug-tools-6.2.14-4.0.el6sat.noarch.rpm tfm-rubygem-foreman_theme_satellite-0.1.47.2-1.el6sat.noarch.rpm tfm-rubygem-katello-3.0.0.162-1.el6sat.noarch.rpm x86_64: libqpid-dispatch-0.4-27.el6sat.x86_64.rpm python-qpid-proton-0.9-21.el6.x86_64.rpm qpid-dispatch-debuginfo-0.4-27.el6sat.x86_64.rpm qpid-dispatch-router-0.4-27.el6sat.x86_64.rpm qpid-dispatch-tools-0.4-27.el6sat.x86_64.rpm qpid-proton-c-0.9-21.el6.x86_64.rpm qpid-proton-debuginfo-0.9-21.el6.x86_64.rpm Red Hat Satellite Capsule 6.2: Source: foreman-1.11.0.86-1.el7sat.src.rpm foreman-installer-1.11.0.18-1.el7sat.src.rpm katello-3.0.0-33.el7sat.src.rpm katello-installer-base-3.0.0.101-1.el7sat.src.rpm pulp-2.8.7.18-1.el7sat.src.rpm pulp-puppet-2.8.7.2-1.el7sat.src.rpm python-twisted-web-12.1.0-5.el7_2.src.rpm qpid-dispatch-0.4-27.el7sat.src.rpm qpid-proton-0.9-21.el7.src.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el7sat.src.rpm satellite-6.2.14-4.0.el7sat.src.rpm noarch: foreman-debug-1.11.0.86-1.el7sat.noarch.rpm foreman-installer-1.11.0.18-1.el7sat.noarch.rpm foreman-installer-katello-3.0.0.101-1.el7sat.noarch.rpm katello-capsule-3.0.0-33.el7sat.noarch.rpm katello-debug-3.0.0-33.el7sat.noarch.rpm katello-installer-base-3.0.0.101-1.el7sat.noarch.rpm katello-service-3.0.0-33.el7sat.noarch.rpm pulp-admin-client-2.8.7.18-1.el7sat.noarch.rpm pulp-nodes-child-2.8.7.18-1.el7sat.noarch.rpm pulp-nodes-common-2.8.7.18-1.el7sat.noarch.rpm pulp-nodes-parent-2.8.7.18-1.el7sat.noarch.rpm pulp-puppet-admin-extensions-2.8.7.2-1.el7sat.noarch.rpm pulp-puppet-plugins-2.8.7.2-1.el7sat.noarch.rpm pulp-selinux-2.8.7.18-1.el7sat.noarch.rpm pulp-server-2.8.7.18-1.el7sat.noarch.rpm python-pulp-agent-lib-2.8.7.18-1.el7sat.noarch.rpm python-pulp-bindings-2.8.7.18-1.el7sat.noarch.rpm python-pulp-client-lib-2.8.7.18-1.el7sat.noarch.rpm python-pulp-common-2.8.7.18-1.el7sat.noarch.rpm python-pulp-oid_validation-2.8.7.18-1.el7sat.noarch.rpm python-pulp-puppet-common-2.8.7.2-1.el7sat.noarch.rpm python-pulp-repoauth-2.8.7.18-1.el7sat.noarch.rpm python-pulp-streamer-2.8.7.18-1.el7sat.noarch.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el7sat.noarch.rpm satellite-capsule-6.2.14-4.0.el7sat.noarch.rpm satellite-debug-tools-6.2.14-4.0.el7sat.noarch.rpm x86_64: libqpid-dispatch-0.4-27.el7sat.x86_64.rpm python-qpid-proton-0.9-21.el7.x86_64.rpm python-twisted-web-12.1.0-5.el7_2.x86_64.rpm qpid-dispatch-debuginfo-0.4-27.el7sat.x86_64.rpm qpid-dispatch-router-0.4-27.el7sat.x86_64.rpm qpid-dispatch-tools-0.4-27.el7sat.x86_64.rpm qpid-proton-c-0.9-21.el7.x86_64.rpm qpid-proton-debuginfo-0.9-21.el7.x86_64.rpm Red Hat Satellite 6.2: Source: candlepin-0.9.54.26-1.el7.src.rpm foreman-1.11.0.86-1.el7sat.src.rpm foreman-installer-1.11.0.18-1.el7sat.src.rpm katello-3.0.0-33.el7sat.src.rpm katello-installer-base-3.0.0.101-1.el7sat.src.rpm pulp-2.8.7.18-1.el7sat.src.rpm pulp-puppet-2.8.7.2-1.el7sat.src.rpm python-twisted-web-12.1.0-5.el7_2.src.rpm qpid-dispatch-0.4-27.el7sat.src.rpm qpid-proton-0.9-21.el7.src.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el7sat.src.rpm satellite-6.2.14-4.0.el7sat.src.rpm tfm-rubygem-foreman_theme_satellite-0.1.47.2-1.el7sat.src.rpm tfm-rubygem-katello-3.0.0.162-1.el7sat.src.rpm noarch: candlepin-0.9.54.26-1.el7.noarch.rpm candlepin-selinux-0.9.54.26-1.el7.noarch.rpm foreman-1.11.0.86-1.el7sat.noarch.rpm foreman-compute-1.11.0.86-1.el7sat.noarch.rpm foreman-debug-1.11.0.86-1.el7sat.noarch.rpm foreman-ec2-1.11.0.86-1.el7sat.noarch.rpm foreman-gce-1.11.0.86-1.el7sat.noarch.rpm foreman-installer-1.11.0.18-1.el7sat.noarch.rpm foreman-installer-katello-3.0.0.101-1.el7sat.noarch.rpm foreman-libvirt-1.11.0.86-1.el7sat.noarch.rpm foreman-openstack-1.11.0.86-1.el7sat.noarch.rpm foreman-ovirt-1.11.0.86-1.el7sat.noarch.rpm foreman-postgresql-1.11.0.86-1.el7sat.noarch.rpm foreman-rackspace-1.11.0.86-1.el7sat.noarch.rpm foreman-vmware-1.11.0.86-1.el7sat.noarch.rpm katello-3.0.0-33.el7sat.noarch.rpm katello-capsule-3.0.0-33.el7sat.noarch.rpm katello-common-3.0.0-33.el7sat.noarch.rpm katello-debug-3.0.0-33.el7sat.noarch.rpm katello-installer-base-3.0.0.101-1.el7sat.noarch.rpm katello-service-3.0.0-33.el7sat.noarch.rpm pulp-admin-client-2.8.7.18-1.el7sat.noarch.rpm pulp-puppet-admin-extensions-2.8.7.2-1.el7sat.noarch.rpm pulp-puppet-plugins-2.8.7.2-1.el7sat.noarch.rpm pulp-puppet-tools-2.8.7.2-1.el7sat.noarch.rpm pulp-selinux-2.8.7.18-1.el7sat.noarch.rpm pulp-server-2.8.7.18-1.el7sat.noarch.rpm python-pulp-agent-lib-2.8.7.18-1.el7sat.noarch.rpm python-pulp-bindings-2.8.7.18-1.el7sat.noarch.rpm python-pulp-client-lib-2.8.7.18-1.el7sat.noarch.rpm python-pulp-common-2.8.7.18-1.el7sat.noarch.rpm python-pulp-oid_validation-2.8.7.18-1.el7sat.noarch.rpm python-pulp-puppet-common-2.8.7.2-1.el7sat.noarch.rpm python-pulp-repoauth-2.8.7.18-1.el7sat.noarch.rpm python-pulp-streamer-2.8.7.18-1.el7sat.noarch.rpm rubygem-smart_proxy_openscap-0.5.3.9-2.el7sat.noarch.rpm satellite-6.2.14-4.0.el7sat.noarch.rpm satellite-capsule-6.2.14-4.0.el7sat.noarch.rpm satellite-cli-6.2.14-4.0.el7sat.noarch.rpm satellite-debug-tools-6.2.14-4.0.el7sat.noarch.rpm tfm-rubygem-foreman_theme_satellite-0.1.47.2-1.el7sat.noarch.rpm tfm-rubygem-katello-3.0.0.162-1.el7sat.noarch.rpm tfm-rubygem-katello_ostree-3.0.0.162-1.el7sat.noarch.rpm x86_64: libqpid-dispatch-0.4-27.el7sat.x86_64.rpm python-qpid-proton-0.9-21.el7.x86_64.rpm python-twisted-web-12.1.0-5.el7_2.x86_64.rpm qpid-dispatch-debuginfo-0.4-27.el7sat.x86_64.rpm qpid-dispatch-router-0.4-27.el7sat.x86_64.rpm qpid-dispatch-tools-0.4-27.el7sat.x86_64.rpm qpid-proton-c-0.9-21.el7.x86_64.rpm qpid-proton-debuginfo-0.9-21.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1000111 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/CVE-2016-1000111 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFaeGJ4XlSAg2UNWIIRAnr0AKCk792e2ZNqwOW214s/gy+Hm/vQ9QCgmTNC d3mkeAjZi3UNcKmCyhewqsA= =zeqv - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWnkalIx+lLeg9Ub1AQg1rBAAib/kntjXU7ebhj1KcKG4+y4v73KR5X8G AR4zHqtTzYqjKSl2djF1pJESHUwLvdnosqorMrls+vgTWd72RiC1VUS+sGZV+53l 9U5/KgNkz6MwqWQKT+edHeEX2m+33jYxuxOOt0vonLNi8rNzvrJs8sv726zMTTwg 6wdNd/vlePZ1Oj5Kr5sAHAExpldLBv9ZWppNPId39Mo6sK6b9ikkHhYQ3MR0hbmb rf2fkweDxt4+qYtCuh3zVHmlIPfPmyt+xm9TVLigAL+zAMkG1WAwqE9kHEYDmb/5 ss0agbvg2t11x1YGr7zd/4KVo9cvezjk9beYEIP8GPbrbF6z3j/4LYRyCfK+iSID wOyjUfAswNi6oazheW8UtYocEq1XEd0nmfzC08h8ibBcBMXsveT0q3MP7WRmXoo2 jJmGK5uT7Pm/cav+kMs4prUFr7QdBvuz9UyEP+NCric9oyHro2vKrXOxbLynbhhB BzukZjiDnfA3CE4BNIP0BgHdZYHl9h5QV67jTHfwl45/k7bKF6gTXoS7hir0qK5A C1thmhgfSmNU9ThD33dal7RKQCxRZsgUkF5vwpB9VkEpv2/cj/z3pWckb2/dw9aM uix/vObpLgnk7kaWcrjvnXYakjyDap7rIf1qrugVKxWv36sxBbSBBMXZodvdmh/q YrA2dmf0824= =LdoS -----END PGP SIGNATURE-----