[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2001/dsa-0{61,75,80,42,29}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2001/dsa-029.wml	2002-01-08 05:04:47.000000000 +0500
+++ russian/security/2001/dsa-029.wml	2015-12-30 13:50:50.248502648 +0500
@@ -1,22 +1,23 @@
- -<define-tag moreinfo>The following problems have been reported for the version
- -of proftpd in Debian 2.2 (potato):
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag moreinfo>Ð?Ñ?ло Ñ?ообÑ?ено о Ñ?ледÑ?Ñ?Ñ?иÑ? пÑ?огÑ?амаÑ? в веÑ?Ñ?ии
+proftpd, поÑ?Ñ?авлÑ?емой в Ñ?оÑ?Ñ?аве Debian 2.2 (potato):
 <ol>
- -<li>There is a memory leak in the SIZE command which can result in a
- -denial of service, as reported by Wojciech Purczynski. This is only a
- -problem if proftpd cannot write to its scoreboard file; the default
- -configuration of proftpd in Debian is not vulnerable.
- -<li>A similar memory leak affects the USER command, also as reported by
- -Wojciech Purczynski. The proftpd in Debian 2.2 is susceptible to this
- -vulnerability; an attacker can cause the proftpd daemon to crash by
- -exhausting its available memory.
- -<li>There were some format string vulnerabilities reported by Przemyslaw
- -Frasunek. These are not known to have exploits, but have been corrected
- -as a precaution.
+<li>Ð?ойÑ?иÑ? Ð?Ñ?Ñ?жинÑ?ки Ñ?ообÑ?ил об Ñ?Ñ?еÑ?ке памÑ?Ñ?и в команде SIZE, коÑ?оÑ?аÑ?
+можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. ЭÑ?а пÑ?облема возникаеÑ? Ñ?олÑ?ко в Ñ?ом
+Ñ?лÑ?Ñ?ае, еÑ?ли proftpd не можеÑ? вÑ?полниÑ?Ñ? запиÑ?Ñ? в Ñ?айл доÑ?ки Ñ?Ñ?Ñ?Ñ?а; наÑ?Ñ?Ñ?ойки
+proftpd по Ñ?молÑ?аниÑ? в Debian не подвеÑ?женÑ? Ñ?Ñ?ой пÑ?облеме.
+<li>Ð?ойÑ?иÑ? Ð?Ñ?Ñ?жинÑ?ки Ñ?ообÑ?ил о поÑ?ожей Ñ?Ñ?еÑ?ке памÑ?Ñ?и в
+команде USER. СÑ?иÑ?аеÑ?Ñ?Ñ?, Ñ?Ñ?о веÑ?Ñ?иÑ? proftpd в Debian 2.2 Ñ?одеÑ?жиÑ? Ñ?Ñ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ?; злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийное завеÑ?Ñ?ение Ñ?абоÑ?Ñ? Ñ?лÑ?жбÑ? proftpd
+пÑ?Ñ?Ñ?м иÑ?полÑ?зованиÑ? вÑ?ей доÑ?Ñ?Ñ?пной ей памÑ?Ñ?и.
+<li>Ð?Ñ?жемÑ?Ñ?лав ФÑ?аÑ?Ñ?нек Ñ?ообÑ?ил о неÑ?колÑ?киÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?Ñ?
+Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки. Ð? Ñ?Ñ?Ñ?еÑ?Ñ?вовании Ñ?кÑ?плоиÑ?ов ниÑ?его не извеÑ?Ñ?но, но Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и
+вÑ?Ñ? Ñ?авно бÑ?ли иÑ?пÑ?авленÑ? в виде пÑ?едоÑ?Ñ?оÑ?ожноÑ?Ñ?и.
 </ol>
- -All three of the above vulnerabilities have been corrected in
- -proftpd-1.2.0pre10-2potato1. We recommend you upgrade your proftpd
- -package immediately.</define-tag>
- -<define-tag description>remote DOS &amp; potential buffer overflow</define-tag>
+Ð?Ñ?е Ñ?Ñ?и Ñ?казаннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?и бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е
+proftpd-1.2.0pre10-2potato1. РекомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее обновиÑ?Ñ?
+пакеÑ? proftpd.</define-tag>
+<define-tag description>Ñ?далÑ?ннÑ?й оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?ное пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 
 # do not modify the following line
 #include '$(ENGLISHDIR)/security/2001/dsa-029.data'
- --- english/security/2001/dsa-042.wml	2002-04-23 12:22:44.000000000 +0600
+++ russian/security/2001/dsa-042.wml	2015-12-30 13:36:58.001052064 +0500
@@ -1,21 +1,22 @@
- -<define-tag moreinfo>Klaus Frank has found a vulnerability in the way gnuserv
- -handled remote connections.  Gnuserv is a remote control facility for Emacsen
- -which is available as standalone program as well as included in XEmacs21.
- -Gnuserv has a buffer for which insufficient boundary checks were made.
- -Unfortunately this buffer affected access control to gnuserv which is using a
- -MIT-MAGIC-COOCKIE based system.  It is possible to overflow the buffer
- -containing the cookie and foozle cookie comparison.
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag moreinfo>Ð?лаÑ?Ñ? ФÑ?анк обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в иÑ?полÑ?зÑ?емом gnuserv
+Ñ?поÑ?обе обÑ?абоÑ?ки Ñ?далÑ?ннÑ?Ñ? подклÑ?Ñ?ений.  Gnuserv &mdash; Ñ?далÑ?ннÑ?й инÑ?Ñ?Ñ?Ñ?менÑ? Ñ?пÑ?авлениÑ? Emacsen,
+доÑ?Ñ?Ñ?пнÑ?й и как оÑ?делÑ?наÑ? пÑ?огÑ?амма, и как Ñ?аÑ?Ñ?Ñ? XEmacs21.
+Gnuserv иÑ?полÑ?зÑ?еÑ? бÑ?Ñ?еÑ?, пÑ?и Ñ?абоÑ?е Ñ? коÑ?оÑ?Ñ?м не вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? необÑ?одимÑ?е пÑ?овеÑ?ки гÑ?аниÑ?.
+Ð? Ñ?ожалениÑ?, Ñ?Ñ?оÑ? бÑ?Ñ?еÑ? каÑ?аеÑ?Ñ?Ñ? Ñ?пÑ?авлениÑ? доÑ?Ñ?Ñ?пом к gnuserv, коÑ?оÑ?Ñ?й иÑ?полÑ?зÑ?еÑ?
+Ñ?иÑ?Ñ?емÑ? на оÑ?нове MIT-MAGIC-COOCKIE.  Ð?ожно вÑ?зваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а,
+Ñ?одеÑ?жаÑ?его кÑ?ки и Ñ?Ñ?авнение кÑ?ки foozle.
 
- -<p>Gnuserv was derived from emacsserver which is part of GNU Emacs.  It was
- -reworked completely and not much is left over from its time as part of
- -GNU Emacs.  Therefore the versions of emacsserver in both Emacs19 and Emacs20
- -doesn't look vulnerable to this bug, they don't even provide a MIT-MAGIC-COOKIE
- -based mechanism.
+<p>Gnuserv Ñ?влÑ?еÑ?Ñ?Ñ? пÑ?оизводнÑ?м пÑ?оекÑ?ом emacsserver, поÑ?ледний вÑ?одиÑ? в GNU Emacs.  Ð?н бÑ?л
+полноÑ?Ñ?Ñ?Ñ? пеÑ?еÑ?абоÑ?ан, и обÑ?его кода Ñ? GNU Emacs поÑ?Ñ?и не
+оÑ?Ñ?алоÑ?Ñ?.  Ð?оÑ?Ñ?омÑ? веÑ?Ñ?ии emacsserver в Emacs19 и Emacs20, как кажеÑ?Ñ?Ñ?,
+не подвеÑ?женÑ? данной оÑ?ибке, Ñ?ак как они даже не пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ? меÑ?анизм на
+оÑ?нове MIT-MAGIC-COOKIE.
 
- -<p>This could lead into a remote user issue commands under the UID of the
- -person running gnuserv.
+<p>ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о Ñ?далÑ?ннÑ?м полÑ?зоваÑ?елÑ? Ñ?можеÑ? запÑ?Ñ?Ñ?иÑ?Ñ? командÑ?
+оÑ? лиÑ?а полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его gnuserv.
 </define-tag>
- -<define-tag description>buffer overflow, weak security</define-tag>
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а, Ñ?лабаÑ? безопаÑ?ноÑ?Ñ?и</define-tag>
 
 # do not modify the following line
 #include '$(ENGLISHDIR)/security/2001/dsa-042.data'
- --- english/security/2001/dsa-061.wml	2001-06-17 17:38:05.000000000 +0600
+++ russian/security/2001/dsa-061.wml	2015-12-30 13:19:41.598723112 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>printf format attack</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>аÑ?ака на Ñ?оÑ?маÑ?нÑ?Ñ? Ñ?Ñ?Ñ?окÑ? printf</define-tag>
 <define-tag moreinfo>
- -The version of GnuPG (GNU Privacy Guard, an OpenPGP implementation)
- -as distributed in Debian GNU/Linux 2.2 suffers from two problems:
+Ð?еÑ?Ñ?иÑ? GnuPG (GNU Privacy Guard, Ñ?еализаÑ?иÑ? OpenPGP),
+поÑ?Ñ?авлÑ?емаÑ? в Ñ?оÑ?Ñ?аве Debian GNU/Linux 2.2, Ñ?одеÑ?жиÑ? две пÑ?облемÑ?:
 
 <ol>
- -<li>fish stiqz reported on bugtraq that there was a printf format
- -problem in the do_get() function: it printed a prompt which included
- -the filename that was being decrypted without checking for
- -possible printf format attacks. This could be exploited by tricking
- -someone into decrypting a file with a specially crafted filename.
+<li>fish stiqz Ñ?ообÑ?ил на bugtraq, Ñ?Ñ?о в Ñ?Ñ?нкÑ?ии do_get() имееÑ?Ñ?Ñ? пÑ?облема
+Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?окой printf: она вÑ?водиÑ? пÑ?иглаÑ?ение, коÑ?оÑ?ое Ñ?одеÑ?жиÑ?
+имÑ? декодиÑ?Ñ?емого Ñ?айла, Ñ?Ñ?о имÑ? не пÑ?овеÑ?Ñ?еÑ?Ñ?Ñ? на пÑ?едмеÑ? возможного
+налиÑ?иÑ? аÑ?ак на Ñ?оÑ?маÑ? printf. ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+злоÑ?мÑ?Ñ?ленник заÑ?Ñ?авиÑ? кого-Ñ?о декодиÑ?оваÑ?Ñ? Ñ?айл, имеÑ?Ñ?ий Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное имÑ?.
 
- -<li>The second bug is related to importing secret keys: when gnupg
- -imported a secret key it would immediately make the associated
- -public key fully trusted which changes your web of trust without
- -asking for a confirmation. To fix this you now need a special
- -option to import a secret key.
+<li>Ð?Ñ?оÑ?аÑ? оÑ?ибка Ñ?вÑ?зана Ñ? импоÑ?Ñ?ом закÑ?Ñ?Ñ?Ñ?Ñ? клÑ?Ñ?ей: когда gnupg
+импоÑ?Ñ?иÑ?Ñ?еÑ? закÑ?Ñ?Ñ?Ñ?й клÑ?Ñ?, Ñ?о он Ñ?Ñ?азÑ? же Ñ?вÑ?зÑ?ваеÑ?Ñ?Ñ? Ñ?
+абÑ?олÑ?Ñ?но довеÑ?еннÑ?м оÑ?кÑ?Ñ?Ñ?Ñ?м клÑ?Ñ?ом, Ñ?Ñ?о изменÑ?еÑ? ваÑ?Ñ? Ñ?еÑ?Ñ? довеÑ?иÑ? без
+запÑ?оÑ?а подÑ?веÑ?ждениÑ?. ЧÑ?обÑ? Ñ?Ñ?о иÑ?пÑ?авиÑ?Ñ?, вам Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?нÑ?Ñ?
+опÑ?иÑ? длÑ? импоÑ?Ñ?а закÑ?Ñ?Ñ?ого клÑ?Ñ?а.
 </ol>
 
- -<p>Both problems have been fixed in version 1.0.6-0potato1.
+<p>Ð?бе пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.0.6-0potato1.
 </define-tag>
 
 # do not modify the following line
- --- english/security/2001/dsa-075.wml	2002-03-20 20:04:58.000000000 +0500
+++ russian/security/2001/dsa-075.wml	2015-12-30 13:25:35.819057466 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>remote exploit</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>Ñ?далÑ?ннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?</define-tag>
 <define-tag moreinfo>
- -The telnet daemon contained in the netkit-telnet-ssl_0.16.3-1 package in
- -the 'stable' (potato) distribution of Debian GNU/Linux is vulnerable to an
- -exploitable overflow in its output handling.
- -The original bug was found by &lt;scut@nb.in-berlin.de&gt;, and announced to
- -bugtraq on Jul 18 2001. At that time, netkit-telnet versions after 0.14 were
- -not believed to be vulnerable.
+СлÑ?жба telnet, Ñ?одеÑ?жаÑ?аÑ?Ñ?Ñ? в пакеÑ?е netkit-telnet-ssl_0.16.3-1 в
+'Ñ?Ñ?абилÑ?ном' (potato) вÑ?пÑ?Ñ?ке Debian GNU/Linux Ñ?Ñ?звима к
+пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?.
+Ð?Ñ?ибка бÑ?ла найдена &lt;scut@nb.in-berlin.de&gt;, и о ней Ñ?ообÑ?или
+в bugtraq 18 иÑ?лÑ? 2001 года. Тогда Ñ?Ñ?иÑ?алоÑ?Ñ?, Ñ?Ñ?о веÑ?Ñ?ии netkit-telnet Ñ?Ñ?аÑ?Ñ?е 0.14
+не Ñ?одеÑ?жаÑ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?.
 
- -<p>On Aug 10 2001, zen-parse posted an advisory based on the same problem, for
- -all netkit-telnet versions below 0.17.
+<p>10 авгÑ?Ñ?Ñ?а 2001 года пÑ?оекÑ? zen-parse Ñ?азмеÑ?Ñ?ил Ñ?екомендаÑ?иÑ? (на оÑ?нове Ñ?Ñ?ой пÑ?облемÑ?) длÑ?
+вÑ?еÑ? веÑ?Ñ?иÑ? netkit-telnet младÑ?е 0.17.
 
- -<p>More details can be found on
+<p>Ð?ополниÑ?елÑ?наÑ? инÑ?оÑ?маÑ?иÑ? можеÑ? бÑ?Ñ?Ñ? найдена на
 <a href="http://online.securityfocus.com/archive/1/203000";>SecurityFocus</a>.
- -As Debian uses the 'telnetd' user to run in.telnetd, this is not a remote
- -root compromise on Debian systems; the 'telnetd' user can be compromised.
+Ð?оÑ?колÑ?кÑ? в Debian  длÑ? Ñ?ого, Ñ?Ñ?обÑ? запÑ?Ñ?каÑ?Ñ? in.telnetd, иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? полÑ?зоваÑ?елÑ? 'telnetd', в Ñ?иÑ?Ñ?емаÑ?
+Debian Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? не можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?далÑ?нной компÑ?омеÑ?аÑ?ии Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?; компÑ?омеÑ?иÑ?ован можеÑ? бÑ?Ñ?Ñ? полÑ?зоваÑ?елÑ? 'telnetd'.
 
- -<p>We strongly advise you update your netkit-telnet-ssl packages to the versions
- -listed below.
+<p>Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? netkit-telnet-ssl до пÑ?иведÑ?ннÑ?Ñ? ниже
+веÑ?Ñ?ий.
 </define-tag>
 
 # do not modify the following line
- --- english/security/2001/dsa-080.wml	2004-12-13 05:20:29.000000000 +0500
+++ russian/security/2001/dsa-080.wml	2015-12-30 13:30:05.921355494 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>unauthorized gathering of data</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неавÑ?оÑ?изованнÑ?й Ñ?боÑ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -Nergal reported a <a
+Nergal Ñ?ообÑ?ил об <a
 href="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=458013&amp;group_id=4593&amp;atid=104593";>\
- -vulnerability</a> in the htsearch program which is
- -distributed as part of the ht://Dig package, an indexing and searching
- -system for small domains or intranets.  Using former versions it was
- -able to pass the parameter <kbd>-c</kbd> to the cgi program in order to use a
- -different configuration file.
+Ñ?Ñ?звимоÑ?Ñ?и</a> в пÑ?огÑ?амме htsearch, коÑ?оÑ?аÑ? поÑ?Ñ?авлÑ?еÑ?Ñ?Ñ? в каÑ?еÑ?Ñ?ве Ñ?аÑ?Ñ?и
+пакеÑ?а ht://Dig, Ñ?иÑ?Ñ?емÑ? индекÑ?иÑ?ованиÑ? и поиÑ?ка длÑ? неболÑ?Ñ?иÑ?
+доменов и внÑ?Ñ?Ñ?енниÑ? Ñ?еÑ?ей.  ЭÑ?а пÑ?огÑ?амма можеÑ?
+пеÑ?едаваÑ?Ñ? паÑ?амеÑ?Ñ? <kbd>-c</kbd> cgi-пÑ?огÑ?амме Ñ? Ñ?елÑ? иÑ?полÑ?зованиÑ?
+дÑ?Ñ?гого Ñ?айла наÑ?Ñ?Ñ?ойки.
 
- -<p>A malicious user could point htsearch to a file like
- -<var>/dev/zero</var> and
- -let the server run in an endless loop, trying to read config
- -parameters.  If the user has write permission on the server they can
- -point the program to it and retrieve any file readable by the webserver
- -user id.
+<p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? Ñ?казаÑ?Ñ? htsearch Ñ?айл Ñ?ипа
+<var>/dev/zero</var>, Ñ?Ñ?о пÑ?иведÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о
+Ñ?еÑ?веÑ? войдÑ?Ñ? в беÑ?конеÑ?нÑ?й Ñ?икл, пÑ?Ñ?аÑ?Ñ?Ñ? пÑ?оÑ?еÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?Ñ?
+наÑ?Ñ?Ñ?ойки.  Ð?Ñ?ли полÑ?зоваÑ?елÑ? имееÑ? пÑ?ава на запиÑ?Ñ? на Ñ?еÑ?веÑ?е, Ñ?о он
+можеÑ? Ñ?казаÑ?Ñ? пÑ?огÑ?амме полÑ?Ñ?иÑ?Ñ? лÑ?бой Ñ?айл, коÑ?оÑ?Ñ?й можеÑ? бÑ?Ñ?Ñ? пÑ?оÑ?иÑ?ан полÑ?зоваÑ?елем, оÑ? лиÑ?а коÑ?оÑ?ого
+запÑ?Ñ?ен веб-Ñ?еÑ?веÑ?.
 
- -<p>This problem has been fixed in version 3.1.5-2.0potato.1 for Debian
+<p>ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 3.1.5-2.0potato.1 длÑ?
 GNU/Linux 2.2.
 
- -<p>We recommend that you upgrade your htdig package immediately.
+<p>РекомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее обновиÑ?Ñ? пакеÑ? htdig.
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJWg5soAAoJEF7nbuICFtKlr9UP/i2sA4V570NfYWHgazbmygNL
D73mp3dBOBbkthon7h6DPLg5kUwUr2iqNopDnkoybyMxmqBWnsupLafccC9aejkv
Gj0v135JzsvnD+yk0Bp5K5ELesCeXx7T2ABF3O7KnBjqQICNf9WOBhneQBBux8IG
dFVPUvEwdlqjeR6S6taFwZ043cKX8Ma28ei7rXrrQwhzTUoxdduhvjfYU01fcAtW
LpWJPh1023wPNn7xAISS7IrnTaKAs2is8tPre4hcMRduYln+lsOcAsr0dOAT+L4n
9tS+hskuqcXyJV4aKURfRj/CH/yVnSwMqG4FD+xTAwFvgRTO7EhBnUTq2DxPPjc2
Cx9Bk8v/u2pxkMALsjhrZzIM8qxoRf6KVcLeitlV88J3LQreDbMBt+IQudmMMnjk
pjKbMTKQ/YKqzr4XZIHEY9qyq9j5HWkZuV0Q/4lMEqrZUOZh4cVRa6qNPgqVWpri
ULWpoNrH/aimPfuzE0ShTj4IUmCeew5oXVau52o8sKxzCcipGrk4hxQy+RmLl5gr
7AMtlQe7YZ+9+MH806m/QeDHj6Ez7CbUIkvYfviprySwkW3GZncTq3212e0Mg9KA
yMmnMqOjO8oiYRaqB5Q4GK0n93JnNY7SFl2oMGxhoBOFQU01r1WCOFUnAPh4J2qV
IF4+mr+mi5CstueVER+L
=plLu
-----END PGP SIGNATURE-----


Reply to: