Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1334.2 Multiple security vulnerabilities affecting IBM Rational ClearCase 23 May 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Rational ClearCase Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-1000007 CVE-2018-1000005 CVE-2018-1447 CVE-2018-1427 CVE-2017-10356 CVE-2017-10345 CVE-2017-3736 CVE-2017-3732 CVE-2016-0705 CVE-2016-0702 Reference: ASB-2016.0042 ASB-2016.0019 ESB-2016.0544 ESB-2016.0543.2 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=swg22012279 http://www.ibm.com/support/docview.wss?uid=swg22014495 http://www.ibm.com/support/docview.wss?uid=swg22012827 Comment: This bulletin contains three (3) IBM security advisories. Revision History: May 23 2018: Updated Affected Products and Remediation/Fixes on swg22012827 May 2 2018: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2017-10356, CVE-2017-10345) Document information More support for: Rational ClearCase ClearCase Remote Client Software version: 9.0, 9.0.0.1, 9.0.0.2, 9.0.0.3, 9.0.0.4, 9.0.0.5, 9.0.0.6, 9.0.1, 9.0.1.1, 9.0.1.2 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Reference #: 2012279 Modified date: 30 April 2018 Security Bulletin Summary There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Versions 7 and 8, which are used by IBM Rational ClearCase. These issues were disclosed as part of the IBM Java SDK updates in October 2017. Vulnerability Details CVEID: CVE-2017-10356 DESCRIPTION: An unspecified vulnerability related to the Java SE Security component could allow an unauthenticated attacker to obtain sensitive information resulting in a high confidentiality impact using unknown attack vectors. CVSS Base Score: 6.2 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 133785 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2017-10345 DESCRIPTION: An unspecified vulnerability related to the Java SE Serialization component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base Score: 3.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 133774 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) Affected Products and Versions IBM Rational ClearCase version 9 in the following components: o CCRC WAN server/CM Server component, when configured to use SSL o ClearCase remote client: CCRC/CTE GUI, rcleartool, and CMAPI clients +---------------------------------------+-------------------------------------+ | ClearCase version | Status | +---------------------------------------+-------------------------------------+ | 9.0.1 through 9.0.1.2 | Affected | +---------------------------------------+-------------------------------------+ | 9.0 through 9.0.0.6 | Affected | +---------------------------------------+-------------------------------------+ Remediation/Fixes The solution is to install a fix that includes an updated Java(TM) Virtual Machine with fixes for the issues, and to apply fixes for WebSphere Application Server (WAS). CCRC Client fixes Apply the relevant fixes as listed in the table below. +------------------+------------------------------------------------------+ |Affected Versions | Applying the fix | +------------------+------------------------------------------------------+ | 9.0.1 through |Install Rational ClearCase Fix Pack 3 (9.0.1.3) for | | 9.0.1.2 |9.0.1 | | 9.0 through | | | 9.0.0.6 | | +------------------+------------------------------------------------------+ For 7.0, 7.1, 8.0, and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product. Notes: ? If you use CCRC as an extension offering installed into an Eclipse shell (one not provided as part of a ClearCase release), or you use rcleartool or CMAPI using a Java(TM) Virtual Machine not supplied by IBM as part of Rational ClearCase, you should update the Java(TM) Virtual Machine that you use to include a fix for the above issues. Contact the supplier of your Java(TM) Virtual Machine and/or the supplier of your Eclipse shell. CCRC WAN server fixes 1. Determine the WAS version used by your CCRC WAN server. Navigate to the CCRC profile directory (either the profile you specified when installing ClearCase, or <ccase-home>/common/ccrcprofile), then execute the script: bin/versionInfo.sh (UNIX) or bin\versionInfo.bat (Windows). The output includes a section "IBM WebSphere Application Server". Make note of the version listed in this section. 2. Review the following WAS security bulletin: Security Bulletin: Multiple vulnerabilities in IBM(R) Java SDK affects WebSphere Application Server October 2017 CPU and apply the latest available fix for the version of WAS used for CCRC WAN server. Note: there may be newer security fixes for WebSphere Application Server. Follow the link below (in the section "Get Notified about Future Security Bulletins") to subscribe to WebSphere product support alerts for additional Java SDK fixes. +------------------+------------------------------------------------------+ |Affected Versions | Applying the fix | +------------------+------------------------------------------------------+ |9.0.0.x |Apply the appropriate WebSphere Application Server fix| |9.0.1.x |directly to your CCRC WAN server host. No | | |ClearCase-specific steps are necessary. | +------------------+------------------------------------------------------+ Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. Important note IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. References Complete CVSS v3 Guide On-line Calculator v3 IBM Java SDK security bulletin Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 30 April 2018: Originally published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --- Security Bulletin: Vulnerabilities in cURL component shipped with IBM Rational ClearCase (CVE-2018-1000005, CVE-2018-1000007) Document information More support for: Rational ClearCase Integrations Software version: 8.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9, 8.0.0.10, 8.0.0.11, 8.0.0.12, 8.0.0.13, 8.0.0.14, 8.0.0.15, 8.0.0.16, 8.0.0.17, 8.0.0.18, 8.0.0.19, 8.0.0.20, 8.0.0.21, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 8.0.1.5, 8.0.1.6, 8.0.1.7, 8.0.1.8, 8.0.1.9, 8.0.1.10, 8.0.1.11, 8.0.1.12, 8.0.1.13, 8.0.1.14, 8.0.1.15, 8.0.1.16, 9.0, 9.0.0.1, 9.0.0.2, 9.0.0.3, 9.0.0.4, 9.0.0.5, 9.0.0.6, 9.0.1, 9.0.1.1, 9.0.1.2 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Reference #: 2014495 Modified date: 30 April 2018 Security Bulletin Summary IBM Rational ClearCase is affected by cURL/libcURL vulnerabilities. Vulnerability Details CVEID: CVE-2018-1000007 DESCRIPTION: cURL liburl could allow a remote attacker to obtain sensitive information, caused by a flaw when passing on custom Authorization: headers. By sending a specially-crafted HTTP redirects request, a remote attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 138218 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2018-1000005 DESCRIPTION: cURL libcurl is vulnerable to a denial of service, caused by an out-of-bounds read flaw in code handling HTTP/2 trailers. By sending specially-crafted HTTP/2 trailer data, a remote attacker could exploit this vulnerability to cause a denial of service or information disclosure condition. CVSS Base Score: 9.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 138219 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) Affected Products and Versions The cURL component is used in the CMI integration, the OSLC-based ClearQuest integration, and in the automatic view client. +---------------------------------------+-------------------------------------+ | ClearCase client version | Status | +---------------------------------------+-------------------------------------+ | 9.0.1 through 9.0.1.2 | Affected | +---------------------------------------+-------------------------------------+ | 9.0 through 9.0.0.6 | Affected | +---------------------------------------+-------------------------------------+ | 8.0.1 through 8.0.1.16 | Affected | +---------------------------------------+-------------------------------------+ | 8.0 through 8.0.0.21 | Affected | +---------------------------------------+-------------------------------------+ Remediation/Fixes The solution is to upgrade to a fix pack of ClearCase that fixes the vulnerabilities in the cURL component. +------------------+----------------------------------------------------------+ |Affected Versions | Applying the fix | +------------------+----------------------------------------------------------+ | 9.0.1 through |Install Rational ClearCase Fix Pack 3 (9.0.1.3) for 9.0.1 | | 9.0.1.2 | | | 9.0 through | | | 9.0.0.6 | | +------------------+----------------------------------------------------------+ | 8.0.1 through |Install Rational ClearCase Fix Pack 17 (8.0.1.17) for | | 8.0.1.16 |8.0.1 | | 8.0 through | | | 8.0.0.21 | | +------------------+----------------------------------------------------------+ For 7.0, 7.1, and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. Important note IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. References Complete CVSS v3 Guide On-line Calculator v3 cURL vulnerability listing Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 30 April 2018: Original copy published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --- Security Bulletin: Multiple security vulnerabilities have been identified in GSKit shipped with IBM Rational ClearCase CVE-2016-0702; CVE-2018-1447; CVE-2018-1427; CVE-2017-3736; CVE-2017-3732; CVE-2016-0705 Document information More support for: Rational ClearCase Integrations: IBM Software version: 8.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9, 8.0.0.10, 8.0.0.11, 8.0.0.12, 8.0.0.13, 8.0.0.14, 8.0.0.15, 8.0.0.16, 8.0.0.17, 8.0.0.18, 8.0.0.19, 8.0.0.20, 8.0.0.21, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 8.0.1.5, 8.0.1.6, 8.0.1.7, 8.0.1.8, 8.0.1.9, 8.0.1.10, 8.0.1.11, 8.0.1.12, 8.0.1.13, 8.0.1.14, 8.0.1.15, 8.0.1.16, 9.0, 9.0.0.1, 9.0.0.2, 9.0.0.3, 9.0.0.4, 9.0.0.5, 9.0.0.6, 9.0.1, 9.0.1.1, 9.0.1.2 Operating system(s): Windows Reference #: 2012827 Modified date: 21 May 2018 Summary Vulnerabilities have been addressed in the GSKit component of IBM Rational ClearCase. Vulnerability Details CVEID: CVE-2016-0702 DESCRIPTION: OpenSSL could allow a local attacker to obtain sensitive information, caused by a side-channel attack against a system based on the Intel Sandy-Bridge microarchitecture. An attacker could exploit this vulnerability to recover RSA keys. CVSS Base Score: 2.9 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 111144 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2018-1447 DESCRIPTION: The GSKit CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. CVSS Base Score: 5.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 139972 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2018-1427 DESCRIPTION:IBM GSKit contains several environment variables that a local attacker could overflow and cause a denial of service. CVSS Base Score: 6.2 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 139072 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2017-3736 DESCRIPTION:OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagation flaw in the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker with online access to an unpatched system could exploit this vulnerability to obtain information about the private key. CVSS Base Score: 5.9 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 134397 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2017-3732 DESCRIPTION:OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagating bug in the x86_64 Montgomery squaring procedure. An attacker could exploit this vulnerability to obtain information about the private key. CVSS Base Score: 5.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 121313 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2016-0705 DESCRIPTION:OpenSSL is vulnerable to a denial of service, caused by a double-free error when parsing DSA private keys. An attacker could exploit this vulnerability to corrupt memory and cause a denial of service. CVSS Base Score: 3.7 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 111140 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions +--------------------------------------+-------------------------------------+ | ClearCase Windows CMI/OSLC client | Status | +--------------------------------------+-------------------------------------+ | 8.0 through 8.0.0.21 | Affected | | 8.0.1 through 8.0.1.16 | | | 9.0 through 9.0.0.6 | | | 9.0.1 through 9.0.1.2 | | +--------------------------------------+-------------------------------------+ CMI and OSLC integrations: Windows clients only, of the indicated releases. The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with a change management system with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not affected by this portion of the vulnerability. The UCM-enabled CQ integration without using OSLC (SQUID) is not affected by this vulnerability. +--------------------------------------+-------------------------------------+ | CCRC WAN server release | Status | +--------------------------------------+-------------------------------------+ | 8.0 through 8.0.0.21 | Affected | | 8.0.1 through 8.0.1.16 | | | 9.0 through 9.0.0.6 | | | 9.0.1 through 9.0.1.2 | | +--------------------------------------+-------------------------------------+ CCRC WAN Server: All platforms of the indicated releases. Remediation/Fixes Note: After applying the fixes as noted below, please refer to this document http://publib.boulder.ibm.com/httpserv/ihsdiag/restash.html for information concerning password re-stashing. It is advised that you re-stash your password due to CVE-2018-1447 after you apply the fixes. The solution is to upgrade to a newer fix pack or release of ClearCase, and to apply fixes for IBM HTTP Server (IHS). CMI and OSLC integrations on Windows clients: The solution is to install a newer, fixed version of the GSKit runtime component. +-------------------+--------------------------------------------------------+ | Affected Versions | Applying the fix | +-------------------+--------------------------------------------------------+ | 9.0.1 through |Install Rational ClearCase Fix Pack 3 (9.0.1.3) for | | 9.0.1.2 |9.0.1 | |9.0 through 9.0.0.6| | +-------------------+--------------------------------------------------------+ | 8.0.1 through |Install Rational ClearCase Fix Pack 17 (8.0.1.17) for | | 8.0.1.16 |8.0.1 | | 8.0 through | | | 8.0.0.21 | | +-------------------+--------------------------------------------------------+ CCRC WAN Server: Apply an IHS fix for the issue: 1. Determine the IHS version used by your CCRC WAN server. Navigate to the IBM HTTP Server installation directory (typically /opt/ibm/HTTPServer or C:\Program Files (x86)\IBM\HTTPServer), then execute the script: bin/ versionInfo.sh (UNIX) or bin\versionInfo.bat (Windows). The output includes a section "IBM HTTP Server for WebSphere Application Server". Make note of the version listed in this section. 2. Review the following IHS security bulletin for the available fixes: Security Bulletin: Multiple vulnerabilities GSKit bundled with IBM HTTP Server. Note: there may be newer security fixes for IBM HTTP Server. Follow the link below (in the section "Get Notified about Future Security Bulletins") to subscribe to WebSphere product support alerts for additional security fixes. 3. Apply the relevant fixes to your IBM HTTP Server installation used on your CCRC WAN server host. No ClearCase-specific steps are necessary. For 7.0, 7.1, 8.0, and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. Important note IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 30 April 2018: Original version published 21 May 2018: Updated Affected Products and Remediation/Fixes for an IHS fix and password re-stashing due to CVE-2018-1447 *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWwS6Pox+lLeg9Ub1AQiyLg/+LW8G+LX9RlbSy85OXlXDpreZwVjlilpC KkU50F6QDlazBIsDxuzJGOgo0LEzMeUStN4JYHljxyDyq0twSdOZ4EDGraHrAqA8 gzSSKNofE9gwIBatoCG+Lr3OKmGzmrX9SpVw7OcmFow9Ro//CW3qZ6BnZrnhNnsB E0lDN1s+CX7pHpG8bZXebfeZDG7/rgGASUlSJBAEwjErHOk11BEY9htGz0YDZUWL 2bZQg0aStFCCyxrzSFLk7v60jVWUiQ0SMaGbK6y5fnAQwJRoUZujEGQixhBUIaEP A+k8SqRY13mftcOhDaTq0bR9eTSdCNpJAZp/gX4iGkiVYDscCzERM09WL/VYTSdd Nwr2arrSkx27pZpeJRt1BxWUEfPImQFytlieC8m0KMrZD4ht2juevdcibGirBWBC pV2OLFOwBievxPpgkGxElrxXMCyu3UepXjXgcEGQa7iz5oL4UR0puseD/FpsPe2D yZtto1ICjcCwunCrYZu6Jaq8/9XvrdoLlpif0t6KMldWaokSROqd2fC/PoHOdoNi L/4r47rYlUXVMSF3d/c35wRicRXfwogeQ5r+s0khnYAriTdbG+Dlj81js4tLVgLi e32HC34z9Kb74HLImv1eoBKfkai7cKvYjThMD69k9ARtkigY9pq7ULDGQmnkI4Rm /H5i+RYTz4w= =3gpD -----END PGP SIGNATURE-----