Processing of gpac_2.2.1+dfsg1-2_source.changes
gpac_2.2.1+dfsg1-2_source.changes uploaded successfully to localhost along with the files: gpac_2.2.1+dfsg1-2.dsc gpac_2.2.1+dfsg1-2.debian.tar.xz gpac_2.2.1+dfsg1-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
gpac_2.2.1+dfsg1-2_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 13 Sep 2023 14:56:05 +0800 Source: gpac Architecture: source Version: 2.2.1+dfsg1-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Shengjing Zhu Closes: 1033116 1034187 1034732 1034890 1036701 1041380 Changes: gpac (2.2.1+dfsg1-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group (See #1038784) * Upload to unstable. * Backport patch to build with ffmpeg 6.0 (Closes: #1041380) . gpac (2.2.1+dfsg1-1) experimental; urgency=medium . * New upstream version, closes: #1033116, #1034732, #1034187, #1036701, #1034890 * soname bump libgpac11 -> libgpac12 Checksums-Sha1: 515d078cd5d15d313aee64dbd9f4e67cf8f3cef7 1792 gpac_2.2.1+dfsg1-2.dsc 9d039fa233084402316bd9cb408c07e638b9e1d0 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz 701e4931c4284d79759357714aec8292f05c1236 5325 gpac_2.2.1+dfsg1-2_source.buildinfo Checksums-Sha256: fec96c4cc0e5b24291bd9c057959f945bd70f3eff64e19059cebee6f4c71b5cc 1792 gpac_2.2.1+dfsg1-2.dsc af3728f8e7f919a92f63013a2b8c77143202f68d2320fb1c3bede45696cb133b 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz e1f7d5b34b614d5575a1935c714b3deef8e6a3f752888a5e1e793d13c0e842fd 5325 gpac_2.2.1+dfsg1-2_source.buildinfo Files: 97d4a6d4b6b9495e9d629076fdc3f00a 1792 graphics optional gpac_2.2.1+dfsg1-2.dsc 59c4c28301588d18b2772b4d7d2c01d1 37648 graphics optional gpac_2.2.1+dfsg1-2.debian.tar.xz 13e61d51c866f3a27f2b029ed6e9b2b4 5325 graphics optional gpac_2.2.1+dfsg1-2_source.buildinfo -BEGIN PGP SIGNATURE- iHUEARYIAB0WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCZQFiHAAKCRB/RPol6lUU y1LPAP46U6+EIJ9QVlkB7/alzOVjS8rwJtv3AXCP8hiN1MQmzwD/eA+xNfWYmjYC ttFLF72wb/NNs+Jvc+UX71Z/j73NJwQ= =4Rgn -END PGP SIGNATURE-
Processed: reopening 1034890
Processing commands for cont...@bugs.debian.org: > reopen 1034890 Bug #1034890 {Done: Shengjing Zhu } [src:gpac] gpac: CVE-2023-0841 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions gpac/2.2.1+dfsg1-2. > thanks Stopping processing here. Please contact me if you need assistance. -- 1034890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034890 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: reopening 1036701
Processing commands for cont...@bugs.debian.org: > reopen 1036701 Bug #1036701 {Done: Shengjing Zhu } [src:gpac] gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions gpac/2.2.1+dfsg1-2. > thanks Stopping processing here. Please contact me if you need assistance. -- 1036701: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: reopening 1036701
Processing commands for cont...@bugs.debian.org: > # see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701#17 > reopen 1036701 Bug #1036701 [src:gpac] gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840 Bug 1036701 is not marked as done; doing nothing. > thanks Stopping processing here. Please contact me if you need assistance. -- 1036701: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1051865: override: python3-fswrap:python/optional
Package: ftp.debian.org Control: affects -1 + src:python-fswrap X-Debbugs-Cc: python-fsw...@packages.debian.org User: ftp.debian@packages.debian.org Usertags: override Severity: normal Dear Debian FTP Masters, Currently, binary package python3-fswrap is of Priority: extra. == -> % apt-cache show python3-fswrap Package: python3-fswrap Source: python-fswrap Version: 1.0.1-3 Installed-Size: 40 Maintainer: Debian QA Group Architecture: all Depends: python3:any, python3-distutils Description-en: unified object oriented interface to file system objects (Python 3) File system operations in Python are distributed across modules: os, os.path, fnmatch, shutil and distutils. This module attempts to make the right choices for common operations to provide a single interface. . This package is for Python 3. Description-md5: 0c8e04b86160f0dcf956bcc6e269c9ae Homepage: https://github.com/hyde/fswrap Section: python Priority: extra Filename: pool/main/p/python-fswrap/python3-fswrap_1.0.1-3_all.deb Size: 8636 MD5sum: 8ccc2076919b8c091a211283568f3c2b SHA256: 9b2f19e80ae1af9641ea56072f8a9cbfa6dad6d6b6dffd5620ee6b2770d8d225 As in https://www.debian.org/doc/debian-policy/ch-archive.html#priorities , Priority: extra is now deprecated. Such priority is also not explicitly specified in its debian/control file. As a result, please revert such deprecated priority back to python/optional. Since this package is orphaned, I believe no confirmation from the package maintainer will be needed. Thanks, Boyuan Yang signature.asc Description: This is a digitally signed message part
Bug#1051866: gpac: CVE-2023-0770 CVE-2023-0760 CVE-2023-0358 CVE-2023-23145 CVE-2023-23144 CVE-2023-23143 CVE-2022-4202 CVE-2022-45343 CVE-2022-45283 CVE-2022-45202 CVE-2022-43045 CVE-2022-43044 CVE-
Source: gpac Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi Some of the CVEs in #1033116 seems to not have been addressed (and in part were addressed in a DSA already). Here a fresh bug for the remaining ones. Hi, The following vulnerabilities were published for gpac. CVE-2023-0770[0]: | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to | 2.2. CVE-2023-0760[1]: | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to | V2.1.0-DEV. CVE-2023-0358[2]: | Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. CVE-2023-23145[3]: | GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a | memory leak in lsr_read_rare_full function. CVE-2023-23144[4]: | Integer overflow vulnerability in function Q_DecCoordOnUnitSphere | file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master. CVE-2023-23143[5]: | Buffer overflow vulnerability in function avc_parse_slice in file | media_tools/av_parsers.c. GPAC version 2.3-DEV- | rev1-g4669ba229-master. CVE-2022-4202[6]: | A vulnerability, which was classified as problematic, was found in | GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function | lsr_translate_coords of the file laser/lsr_dec.c. The manipulation | leads to integer overflow. It is possible to launch the attack | remotely. The exploit has been disclosed to the public and may be | used. The name of the patch is | b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply | a patch to fix this issue. VDB-214518 is the identifier assigned to | this vulnerability. CVE-2022-45343[7]: | GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a | heap use-after-free via the Q_IsTypeOn function at | /gpac/src/bifs/unquantize.c. CVE-2022-45283[8]: | GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the | smil_parse_time_list parameter at /scenegraph/svg_attributes.c. CVE-2022-45202[9]: | GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a | stack overflow via the function dimC_box_read at | isomedia/box_code_3gpp.c. CVE-2022-43045[10]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | segmentation violation via the function gf_dump_vrml_sffield at | /scene_manager/scene_dump.c. CVE-2022-43044[11]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | segmentation violation via the function gf_isom_get_meta_item_info | at /isomedia/meta.c. CVE-2022-43043[12]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | segmentation violation via the function BD_CheckSFTimeOffset at | /bifs/field_decode.c. CVE-2022-43042[13]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | heap buffer overflow via the function FixSDTPInTRAF at | isomedia/isom_intern.c. CVE-2022-43040[14]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | heap buffer overflow via the function gf_isom_box_dump_start_ex at | /isomedia/box_funcs.c. CVE-2022-43039[15]: | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a | segmentation violation via the function | gf_isom_meta_restore_items_ref at /isomedia/meta.c. CVE-2022-3222[16]: | Uncontrolled Recursion in GitHub repository gpac/gpac prior to | 2.1.0-DEV. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-0770 https://www.cve.org/CVERecord?id=CVE-2023-0770 [1] https://security-tracker.debian.org/tracker/CVE-2023-0760 https://www.cve.org/CVERecord?id=CVE-2023-0760 [2] https://security-tracker.debian.org/tracker/CVE-2023-0358 https://www.cve.org/CVERecord?id=CVE-2023-0358 [3] https://security-tracker.debian.org/tracker/CVE-2023-23145 https://www.cve.org/CVERecord?id=CVE-2023-23145 [4] https://security-tracker.debian.org/tracker/CVE-2023-23144 https://www.cve.org/CVERecord?id=CVE-2023-23144 [5] https://security-tracker.debian.org/tracker/CVE-2023-23143 https://www.cve.org/CVERecord?id=CVE-2023-23143 [6] https://security-tracker.debian.org/tracker/CVE-2022-4202 https://www.cve.org/CVERecord?id=CVE-2022-4202 [7] https://security-tracker.debian.org/tracker/CVE-2022-45343 https://www.cve.org/CVERecord?id=CVE-2022-45343 [8] https://security-tracker.debian.org/tracker/CVE-2022-45283 https://www.cve.org/CVERecord?id=CVE-2022-45283 [9] https://security-tracker.debian.org/tracker/CVE-2022-45202 https://www.cve.org/CVERecord?id=CVE-2022-45202 [10] https://security-tracker.debian.org/tracker/CVE-2022-43045 https://www.cve.org/CVERecord?id=CVE-2022-43045 [11] https://security-tracker.debian.org/tracker/CVE-2022-43044 https://www.cve.org/CVERecord?id=CVE-2022-43044 [12] https://security-tracker.debian.org/tracker/CVE-2022-43043 https://www.cve.org/CVERecord?id=CVE
Processing of ghostscript_10.02.0~dfsg-1_source.changes
ghostscript_10.02.0~dfsg-1_source.changes uploaded successfully to localhost along with the files: ghostscript_10.02.0~dfsg-1.dsc ghostscript_10.02.0~dfsg.orig.tar.xz ghostscript_10.02.0~dfsg-1.debian.tar.xz ghostscript_10.02.0~dfsg-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
ghostscript_10.02.0~dfsg-1_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 13 Sep 2023 20:18:16 +0200 Source: ghostscript Architecture: source Version: 10.02.0~dfsg-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Jonas Smedegaard Changes: ghostscript (10.02.0~dfsg-1) unstable; urgency=medium . * QA upload . [ upstream ] * new release(s) . [ Jonas Smedegaard ] * update copyright info: update coverage * refresh patches; update DEP-3 patch headers * drop obsolete binary packages ghostscript-x libgs9-common; have binary package ghostscript provide ghostscript-x Checksums-Sha1: d33fc1dc2aee11ca7be4a30675b89d0138a89cf4 2715 ghostscript_10.02.0~dfsg-1.dsc d6b85ff5e0606fd225b4375fd18b4e0cc41d21d6 30068208 ghostscript_10.02.0~dfsg.orig.tar.xz 08ebb1c351b433c5799efa85ffe2ac3a0846720c 83288 ghostscript_10.02.0~dfsg-1.debian.tar.xz 8f5ad2a2616066eea44acd9fbd5f83015938ff56 14534 ghostscript_10.02.0~dfsg-1_amd64.buildinfo Checksums-Sha256: ef469f2c7aa395e99c1d27ec17923b384035d31e4d5faf1e4dbf4b807ec4c67d 2715 ghostscript_10.02.0~dfsg-1.dsc f5f50b8791c864f659dffb5664d558d648dcd451866a575f9fe9809d3c46 30068208 ghostscript_10.02.0~dfsg.orig.tar.xz 220678495cce56776fc1acc8d75dc1650eb04c7e992b47432a83fd689ab0d8f0 83288 ghostscript_10.02.0~dfsg-1.debian.tar.xz da94bbb42a062e48cf7f4822a4b12e3dc695e3a74dfb9bcc794d5aa50fd60eda 14534 ghostscript_10.02.0~dfsg-1_amd64.buildinfo Files: 7c8dbedd6b6d8c3ca53688b7f4cf86ed 2715 text optional ghostscript_10.02.0~dfsg-1.dsc fa3591bdc3963957441b0d2aa0806478 30068208 text optional ghostscript_10.02.0~dfsg.orig.tar.xz 25fed449aac908a93ada933ee0ebbfce 83288 text optional ghostscript_10.02.0~dfsg-1.debian.tar.xz 9b3b253e47979b0feab1d91430b145f3 14534 text optional ghostscript_10.02.0~dfsg-1_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmUCB/oACgkQLHwxRsGg ASHpcA/+OfI4gd9k+2u9RP8RXe71U/s/VnAQedP3W0Rx8avB/SJj06s6C7Ull0df 0Su6w74QZ+hjz7bVVJWvCkK3LaQuPsOgXbvIn6K321Bx7kVXL1OtVkFX4e3qSWkn kyx7kiMvGKoXmWNa1rjDZGXEl8r8WYXzbcN320XeKePVJoxkQnW3qUBykzg18yCU qB2TcMLN6VAA04fgJSSXe03MFMY9kCoASTvB8UgP52lgQQeRXr6Sz3lWKYvLhyAJ WFFZvCTW8WtpfCp2k6FimJPvgyBFPuho8QyCz+nzZhJeVWa+aVOkxxojt3c2AXR8 aJAXLT8mpi2BYz/lBXELxyJimioYR9cd4Yw9T3tWCHdAuzECJJUacjDUTi2xdxg4 CHPmRKmZg0GXeGHr4AqowM+0st3BT0wlg3ORhOlPo2kmJsZMyS07S+41yGqkQYmo 9PAJLZdv/AE917qelp73ngxUwiFzYdNghFWqh8SjPyqJqV7VkPeC0W3ZjI8nkps7 B+TRlBEgk5QPIWKuUUU3/0afAvGP9OP7bygbzvEU/wqlquLV723QYbP9rfGUDnQt XsXhikP73G5cjag6TXGucG6Ll+CuDMtlWLL0u9N6loLQf2rZYfel49cEaGCXWB+f 1UVuTjGoVsJScHgCCp2cZ9Sil+NAp/q346OhWKmoWagdvGjRHI4= =TUxQ -END PGP SIGNATURE-
Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable
Source: ghostscript Source-Version: 10.02.0~dfsg-1 On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Wed, 13 Sep 2023 20:18:16 +0200 > Source: ghostscript > Architecture: source > Version: 10.02.0~dfsg-1 > Distribution: unstable > Urgency: medium > Maintainer: Debian QA Group > Changed-By: Jonas Smedegaard > Changes: > ghostscript (10.02.0~dfsg-1) unstable; urgency=medium > . >* QA upload > . >[ upstream ] >* new release(s) This should address as well CVE-2023-38559 / #1043033 . Closing with the fixed version accordingly. Regards, Salvatore
Processing of ghostscript_10.02.0~dfsg-2_source.changes
ghostscript_10.02.0~dfsg-2_source.changes uploaded successfully to localhost along with the files: ghostscript_10.02.0~dfsg-2.dsc ghostscript_10.02.0~dfsg-2.debian.tar.xz ghostscript_10.02.0~dfsg-2_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1043033: marked as done (ghostscript: CVE-2023-38559)
Your message dated Thu, 14 Sep 2023 07:08:21 +0200 with message-id and subject line Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable has caused the Debian Bug report #1043033, regarding ghostscript: CVE-2023-38559 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1043033: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: ghostscript Version: 10.01.2~dfsg-1 Severity: important Tags: security upstream Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706897 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 10.0.0~dfsg-11+deb12u1 Control: found -1 10.0.0~dfsg-11 Control: found -1 9.53.3~dfsg-7+deb11u5 Control: found -1 9.53.3~dfsg-7 Hi, The following vulnerability was published for ghostscript. CVE-2023-38559[0]: | A buffer overflow flaw was found in base/gdevdevn.c:1973 in | devn_pcx_write_rle() in ghostscript. This issue may allow a local | attacker to cause a denial of service via outputting a crafted PDF | file for a DEVN device with gs. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-38559 https://www.cve.org/CVERecord?id=CVE-2023-38559 [1] https://bugs.ghostscript.com/show_bug.cgi?id=706897 (private) [2] https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f Regards, Salvatore --- End Message --- --- Begin Message --- Source: ghostscript Source-Version: 10.02.0~dfsg-1 On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Wed, 13 Sep 2023 20:18:16 +0200 > Source: ghostscript > Architecture: source > Version: 10.02.0~dfsg-1 > Distribution: unstable > Urgency: medium > Maintainer: Debian QA Group > Changed-By: Jonas Smedegaard > Changes: > ghostscript (10.02.0~dfsg-1) unstable; urgency=medium > . >* QA upload > . >[ upstream ] >* new release(s) This should address as well CVE-2023-38559 / #1043033 . Closing with the fixed version accordingly. Regards, Salvatore--- End Message ---
ghostscript_10.02.0~dfsg-2_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 14 Sep 2023 06:37:04 +0200 Source: ghostscript Architecture: source Version: 10.02.0~dfsg-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Jonas Smedegaard Changes: ghostscript (10.02.0~dfsg-2) unstable; urgency=medium . * QA upload . * declare that ghostscript replaces older ghostscript-x Checksums-Sha1: 9292e59e3a98932f22c62fa4267ba28cf902300b 2715 ghostscript_10.02.0~dfsg-2.dsc 4ff3f1b1acfad3b048cf6824345222deea036c9a 83288 ghostscript_10.02.0~dfsg-2.debian.tar.xz 61982604f3b064b0b2da075f9f36cd824ac541c4 14542 ghostscript_10.02.0~dfsg-2_amd64.buildinfo Checksums-Sha256: 032ce34e4900d0aa1896f60adfe97056ad8a627f531819348efb117b392508d3 2715 ghostscript_10.02.0~dfsg-2.dsc 8c91134507e488a3c52227e466f9858930f1f79e3747cd37d1d41ba341dd1739 83288 ghostscript_10.02.0~dfsg-2.debian.tar.xz da0c8637c91a10a5461b072d6f162cf74cae38027453f06afce39a67b430fb5b 14542 ghostscript_10.02.0~dfsg-2_amd64.buildinfo Files: e76b31d9bd5ea583a00ab805de75737e 2715 text optional ghostscript_10.02.0~dfsg-2.dsc dd8d84272635474aaddb77e71a316e13 83288 text optional ghostscript_10.02.0~dfsg-2.debian.tar.xz 7cdd4ab7b887f6018e772b29f43f6070 14542 text optional ghostscript_10.02.0~dfsg-2_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmUCjwgACgkQLHwxRsGg ASFUgQ//XK8OFMhtzE2hZyrZ1VSmIcSyBoVK9nGzrMrUe8XlXd9pP72bXIUeVnqf eL5d5vtqv9uMbU4FdER01azAa0WMEzfPFvR20GqK+BkuIqcjangzhlnzRLwBh80u 2pHxXp/kZ4cPL1iBaMKmRukQKpzln5f+0ZAfH2d+W43Y+WM5r/BpaFAA3g8Cbw/W tvv3rcZVQuGuTmOIGG0wLbmSmVIFTnVR0eSvAbbC7K84p2tcGB+Jg20YxJeqy2jP uZPwo1Ztse4FaDihQQlZFriUvAbqwV84wukse0Y2jlgtjo5Pvjr6luvcVK+RGe/0 I464mHUJBbo9XVIgPHqtSuHhfKd47Gwq025uCfI3dDsBhLrbmaKZdWLHmlB8cVmW jey10uFxMzxbOX9y8Wo/chKDQlYsmw5O0t21/ibkoHtCUyAoCgHkatKULcLBsmVR MBk063rGhNRrcmGWz0IZCJWBNqGC+mXBhtX+HULmanWkeJLRQt0ilaXSEOv1rI4E Gt0lbCMYseol30YF4GIK9a+bEveii8eFtItZ57XUR1c/jD6AqJep6Qs3c+xVQhAr Vo3lxhdBT6HXDVi3cIuAtCvFL4W7zAcev+aAYHWKcocAPEAVmYQiBG+krArA+S8h d6Jy3BUL3bdDaEZb7TGc6OiDwA2yI4nt3UXWGj2k5+jU0Zt+F8k= =/NmG -END PGP SIGNATURE-