[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2015/dla-246.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-246.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-246.wml	2016-06-08 19:58:55.593960644 +0500
@@ -1,97 +1,98 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The linux-2.6 update issued as DLA-246-1 caused regressions.  This
- -update corrects the defective patches applied in that update causing
- -these problems.  For reference the original advisory text follows.</p>
+<p>Ð?бновление linux-2.6, вÑ?пÑ?Ñ?енное как DLA-246-1, вÑ?звало Ñ?егÑ?еÑ?Ñ?иÑ?.  Ð?анное
+обновление иÑ?пÑ?авлÑ?еÑ? деÑ?екÑ?нÑ?е заплаÑ?Ñ?, коÑ?оÑ?Ñ?е бÑ?ли пÑ?имененÑ? в Ñ?казанном обновлении,
+вÑ?звавÑ?ем пÑ?облемÑ?.  Ð?иже пÑ?иводиÑ?Ñ?Ñ? оÑ?игиналÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии.</p>
 
- -<p>This update fixes the CVEs described below.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? опиÑ?аннÑ?е ниже CVE.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5321";>CVE-2011-5321</a>
 
- -    <p>Jiri Slaby discovered that tty_driver_lookup_tty() may leak a
- -    reference to the tty driver.  A local user could use this flaw
- -    to crash the system.</p></li>
+    <p>Ð?Ñ?жи Слаби обнаÑ?Ñ?жил, Ñ?Ñ?о в Ñ?Ñ?нкÑ?ии tty_driver_lookup_tty() можеÑ? пÑ?оиÑ?Ñ?одиÑ?Ñ? Ñ?Ñ?еÑ?ка
+    Ñ?казаниÑ? на дÑ?айвеÑ? tty.  Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+    длÑ? аваÑ?ийной оÑ?Ñ?ановки Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6689";>CVE-2012-6689</a>
 
- -    <p>Pablo Neira Ayuso discovered that non-root user-space processes
- -    can send forged Netlink notifications to other processes.  A local
- -    user could use this flaw for denial of service or privilege
- -    escalation.</p></li>
+    <p>Ð?абло Ð?ейÑ?а Ð?Ñ?Ñ?о обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?оÑ?еÑ?Ñ?Ñ? из полÑ?зоваÑ?елÑ?Ñ?кого пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва, не пÑ?инадлежаÑ?ие
+    Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?, могÑ?Ñ? оÑ?пÑ?авлÑ?Ñ?Ñ? подделÑ?нÑ?е Ñ?ведомлениÑ? Netlink дÑ?Ñ?гим пÑ?оÑ?еÑ?Ñ?ам.  Ð?окалÑ?нÑ?й
+    полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или повÑ?Ñ?ениÑ?
+    пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3184";>CVE-2014-3184</a>
 
- -    <p>Ben Hawkes discovered that various HID drivers may over-read the
- -    report descriptor buffer, possibly resulting in a crash if a HID
- -    with a crafted descriptor is plugged in.</p></li>
+    <p>Ð?ен ХокÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?азлиÑ?нÑ?е дÑ?айвеÑ?Ñ? HID могÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? Ñ?Ñ?ение бÑ?Ñ?еÑ?а
+    оÑ?Ñ?Ñ?Ñ?ного деÑ?кÑ?ипÑ?оÑ?а Ñ?лиÑ?ком много Ñ?аз, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+    подклÑ?Ñ?аеÑ?Ñ?Ñ? HID-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?во, имеÑ?Ñ?ее Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й деÑ?кÑ?ипÑ?оÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8159";>CVE-2014-8159</a>
 
- -    <p>It was found that the Linux kernel's InfiniBand/RDMA subsystem did
- -    not properly sanitize input parameters while registering memory
- -    regions from user space via the (u)verbs API. A local user with
- -    access to a /dev/infiniband/uverbsX device could use this flaw to
- -    crash the system or, potentially, escalate their privileges on the
- -    system.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о подÑ?иÑ?Ñ?ема InfiniBand/RDMA Ñ?дÑ?а Linux
+    непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? вÑ?однÑ?Ñ? паÑ?амеÑ?Ñ?ов в Ñ?оде Ñ?егиÑ?Ñ?Ñ?аÑ?ии Ñ?егионов
+    памÑ?Ñ?и из полÑ?зоваÑ?елÑ?Ñ?кого пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва Ñ?еÑ?ез API (u)verbs. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?,
+    имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вÑ? /dev/infiniband/uverbsX, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+    длÑ? аваÑ?ийной оÑ?Ñ?ановки Ñ?иÑ?Ñ?емÑ? или поÑ?енÑ?иалÑ?ного повÑ?Ñ?ениÑ? Ñ?воиÑ? пÑ?ивилегий в
+    Ñ?Ñ?ой Ñ?иÑ?Ñ?еме.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9683";>CVE-2014-9683</a>
 
- -    <p>Dmitry Chernenkov discovered that eCryptfs writes past the end of
- -    the allocated buffer during encrypted filename decoding, resulting
- -    in local denial of service.</p></li>
+    <p>Ð?миÑ?Ñ?ий ЧеÑ?ненков обнаÑ?Ñ?жил, Ñ?Ñ?о eCryptfs вÑ?полнÑ?еÑ? запиÑ?Ñ? за пÑ?еделами
+    вÑ?деленного бÑ?Ñ?еÑ?а в Ñ?оде декодиÑ?ованиÑ? закодиÑ?ованного имени Ñ?айла, Ñ?Ñ?о пÑ?иводиÑ?
+    к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9728";>CVE-2014-9728</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9729";>CVE-2014-9729</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9730";>CVE-2014-9730</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9731";>CVE-2014-9731</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167";>CVE-2015-4167</a>
 
- -    <p>Carl Henrik Lunde discovered that the UDF implementation is
- -    missing several necessary length checks.  A local user that can
- -    mount devices could use these various flaws to crash the system,
- -    to leak information from the kernel, or possibly for privilege
- -    escalation.</p></li>
+    <p>Ð?аÑ?л ХенÑ?ик Ð?Ñ?нде обнаÑ?Ñ?жил, Ñ?Ñ?о в Ñ?еализаÑ?ии UDF
+    оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? некоÑ?оÑ?Ñ?е необÑ?одимÑ?е пÑ?овеÑ?ки длин.  Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, Ñ?поÑ?обнÑ?й
+    монÑ?иÑ?оваÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?азлиÑ?нÑ?е Ñ?Ñ?звимоÑ?Ñ?и длÑ? аваÑ?ийной оÑ?Ñ?ановки Ñ?иÑ?Ñ?емÑ?,
+    Ñ?Ñ?еÑ?ки инÑ?оÑ?маÑ?ии из Ñ?дÑ?а или поÑ?енÑ?иалÑ?ного повÑ?Ñ?ениÑ?
+    пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a>
 
- -    <p>Red Hat discovered that the pipe iovec read and write
- -    implementations may iterate over the iovec twice but will modify
- -    the iovec such that the second iteration accesses the wrong
- -    memory.  A local user could use this flaw to crash the system or
- -    possibly for privilege escalation.  This may also result in data
- -    corruption and information leaks in pipes between non-malicious
- -    processes.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники Red Hat обнаÑ?Ñ?жили, Ñ?Ñ?о Ñ?еализаÑ?ии Ñ?Ñ?ениÑ? и запиÑ?и длÑ?
+    канала iovec могÑ?Ñ? дваждÑ? пÑ?оÑ?одиÑ?Ñ? iovec, но изменÑ?Ñ?Ñ?
+    iovec Ñ?аким обÑ?азом, Ñ?Ñ?о пÑ?и вÑ?оÑ?ом пÑ?оÑ?оде они обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к непÑ?авилÑ?номÑ?
+    бÑ?Ñ?еÑ?Ñ? памÑ?Ñ?и.  Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки Ñ?иÑ?Ñ?емÑ? или
+    поÑ?енÑ?иалÑ?ного повÑ?Ñ?ениÑ? пÑ?ивилегий.  Ð?Ñ?оме Ñ?ого, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к повÑ?еждениÑ?
+    даннÑ?Ñ? и Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии в каналаÑ? междÑ? пÑ?авилÑ?но Ñ?абоÑ?аÑ?Ñ?ими
+    пÑ?оÑ?еÑ?Ñ?ами.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2041";>CVE-2015-2041</a>
 
- -    <p>Sasha Levin discovered that the LLC subsystem exposed some
- -    variables as sysctls with the wrong type. On a 64-bit kernel, this
- -    possibly allows privilege escalation from a process with
- -    CAP_NET_ADMIN capability; it also results in a trivial information
- -    leak.</p></li>
+    <p>СаÑ?а Ð?евин обнаÑ?Ñ?жил, Ñ?Ñ?о подÑ?иÑ?Ñ?ема LLC Ñ?аÑ?кÑ?Ñ?ваеÑ? некоÑ?оÑ?Ñ?е
+    пеÑ?еменнÑ?е в каÑ?еÑ?Ñ?ве sysctl Ñ? непÑ?авилÑ?нÑ?м Ñ?ипом. Ð?а 64-биÑ?нÑ?Ñ? Ñ?дÑ?аÑ? Ñ?Ñ?о
+    можеÑ? позволиÑ?Ñ? повÑ?Ñ?иÑ?Ñ? пÑ?ивилегии из пÑ?оÑ?еÑ?Ñ?а, имеÑ?Ñ?его
+    CAP_NET_ADMIN; кÑ?оме Ñ?ого, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?Ñ?ивиалÑ?ной Ñ?Ñ?еÑ?ке
+    инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2042";>CVE-2015-2042</a>
 
- -    <p>Sasha Levin discovered that the RDS subsystem exposed some
- -    variables as sysctls with the wrong type. On a 64-bit kernel, this
- -    results in a trivial information leak.</p></li>
+    <p>СаÑ?а Ð?евин обнаÑ?Ñ?жил, Ñ?Ñ?о подÑ?иÑ?Ñ?ема RDS Ñ?аÑ?кÑ?Ñ?ваеÑ? некоÑ?оÑ?Ñ?е
+    пеÑ?еменнÑ?е в каÑ?еÑ?Ñ?ве sysctl Ñ? непÑ?авилÑ?нÑ?м Ñ?ипом. Ð?а 64-биÑ?нÑ?Ñ? Ñ?дÑ?аÑ? Ñ?Ñ?о
+    пÑ?иводиÑ? к Ñ?Ñ?ивиалÑ?ной Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2830";>CVE-2015-2830</a>
 
- -    <p>Andrew Lutomirski discovered that when a 64-bit task on an amd64
- -    kernel makes a fork(2) or clone(2) system call using int $0x80,
- -    the 32-bit compatibility flag is set (correctly) but is not
- -    cleared on return. As a result, both seccomp and audit will
- -    misinterpret the following system call by the task(s), possibly
- -    leading to a violation of security policy.</p></li>
+    <p>ЭндÑ?Ñ? Ð?Ñ?Ñ?омиÑ?Ñ?ки обнаÑ?Ñ?жил, Ñ?Ñ?о когда 64-биÑ?наÑ? задаÑ?а на Ñ?дÑ?е amd64
+    вÑ?полнÑ?еÑ? Ñ?иÑ?Ñ?емнÑ?й вÑ?зов fork(2) или clone(2), иÑ?полÑ?зÑ?Ñ? $0x80,
+    Ñ?о Ñ?лаг 32-биÑ?ной Ñ?овмеÑ?Ñ?имоÑ?Ñ?и (пÑ?авилÑ?но) Ñ?Ñ?Ñ?анавливаеÑ?Ñ?Ñ?, Ñ?о не
+    оÑ?иÑ?аеÑ?Ñ?Ñ? пÑ?и возвÑ?аÑ?е. Ð? Ñ?езÑ?лÑ?Ñ?аÑ?е и seccomp, и audit
+    непÑ?авилÑ?но инÑ?еÑ?пÑ?еÑ?иÑ?Ñ?Ñ?Ñ? Ñ?ледÑ?Ñ?Ñ?ий Ñ?иÑ?Ñ?емнÑ?й вÑ?зов задаÑ?и/задаÑ?, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к наÑ?Ñ?Ñ?ениÑ? пÑ?авил безопаÑ?ноÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2922";>CVE-2015-2922</a>
 
- -    <p>Modio AB discovered that the IPv6 subsystem would process a router
- -    advertisement that specifies no route but only a hop limit, which
- -    would then be applied to the interface that received it. This can
- -    result in loss of IPv6 connectivity beyond the local network.</p>
+    <p>СоÑ?Ñ?Ñ?дники Modio AB обнаÑ?Ñ?жили, Ñ?Ñ?о подÑ?иÑ?Ñ?ема IPv6 обÑ?абаÑ?Ñ?ваÑ?Ñ? обÑ?Ñ?влениÑ?
+    маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?оÑ?а, не опÑ?еделÑ?Ñ?Ñ?ие пÑ?Ñ?и, а Ñ?олÑ?ко огÑ?аниÑ?ение пеÑ?еÑ?Ñ?лок, Ñ?Ñ?о
+    заÑ?ем можеÑ? пÑ?именÑ?Ñ?Ñ?Ñ?Ñ? к инÑ?еÑ?Ñ?ейÑ?Ñ?, полÑ?Ñ?ивÑ?емÑ? Ñ?акое обÑ?Ñ?вление. ЭÑ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к поÑ?еÑ?е Ñ?оединениÑ? по IPv6 за пÑ?еделами локалÑ?ной Ñ?еÑ?и.</p>
 
- -    <p>This may be mitigated by disabling processing of IPv6 router
- -    advertisements if they are not needed:</p>
+    <p>ЭÑ?о можно обойÑ?и пÑ?Ñ?Ñ?м оÑ?клÑ?Ñ?ениÑ? обÑ?абоÑ?ки обÑ?Ñ?влений маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?оÑ?ов
+    IPv6 в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли они не нÑ?жнÑ?:</p>
 <pre>
         sysctl net.ipv6.conf.default.accept_ra=0
         sysctl net.ipv6.conf.&lt;interface&gt;.accept_ra=0
@@ -99,26 +100,26 @@
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3339";>CVE-2015-3339</a>
 
- -    <p>It was found that the execve(2) system call can race with inode
- -    attribute changes made by chown(2).  Although chown(2) clears the
- -    setuid/setgid bits of a file if it changes the respective owner ID,
- -    this race condition could result in execve(2) setting effective
- -    uid/gid to the new owner ID, a privilege escalation.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?иÑ?Ñ?емнÑ?й вÑ?зов execve(2) можеÑ? пеÑ?еÑ?одиÑ?Ñ? в Ñ?оÑ?Ñ?оÑ?ние гонки
+    Ñ? изменением аÑ?Ñ?ибÑ?Ñ?а индекÑ?ного деÑ?кÑ?ипÑ?оÑ?а, вÑ?полнÑ?емом chown(2).  ХоÑ?Ñ? chown(2) оÑ?иÑ?аеÑ?
+    биÑ?Ñ?, позволÑ?Ñ?Ñ?ие запÑ?Ñ?каÑ?Ñ? пÑ?огÑ?аммÑ? оÑ? лиÑ?а дÑ?Ñ?гого полÑ?зоваÑ?елÑ? или гÑ?Ñ?ппÑ?, в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли изменÑ?еÑ?Ñ?Ñ? иденÑ?иÑ?икаÑ?оÑ? владелÑ?Ñ?а,
+    данное Ñ?оÑ?Ñ?оÑ?ние гонки можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о execve(2) можеÑ? Ñ?Ñ?Ñ?ановиÑ?Ñ?
+    Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ий биÑ? пÑ?ав доÑ?Ñ?Ñ?па длÑ? нового иденÑ?иÑ?икаÑ?оÑ?а владелÑ?Ñ?а, Ñ?Ñ?о повÑ?Ñ?аеÑ? пÑ?ивилегии.</p></li>
 
 </ul>
 
- -<p>For the oldoldstable distribution (squeeze), these problems have been
- -fixed in version 2.6.32-48squeeze12.</p>
+<p>Ð? Ñ?Ñ?аÑ?ом пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.6.32-48squeeze12.</p>
 
- -<p>For the oldstable distribution (wheezy), these problems were fixed in
- -linux version 3.2.68-1+deb7u1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> and
- -<a href="https://security-tracker.debian.org/tracker/CVE-2015-4167";>CVE-2015-4167</a> which will be fixed soon.</p>
- -
- -<p>For the stable distribution (jessie), these problems were fixed in
- -linux version 3.16.7-ckt11-1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167";>CVE-2015-4167</a> which
- -will be fixed later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+пакеÑ?е linux веÑ?Ñ?ии 3.2.68-1+deb7u1 или более Ñ?анниÑ? за иÑ?клÑ?Ñ?ением <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> и
+<a href="https://security-tracker.debian.org/tracker/CVE-2015-4167";>CVE-2015-4167</a>, коÑ?оÑ?Ñ?е бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+пакеÑ?е linux веÑ?Ñ?ии 3.16.7-ckt11-1 или более Ñ?анниÑ? за иÑ?клÑ?Ñ?ением <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167";>CVE-2015-4167</a>, коÑ?оÑ?аÑ?
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your linux-2.6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux-2.6.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXWDKyAAoJEF7nbuICFtKlBoYQAJNWJ/iaLkWHAhFGm4rycuBG
8VeeDswOWW1BOBKB4jVqRl/FlX8Lu2GLgpdcFUSu5AvFzmYHZsv1HNgMpR+N7Fhn
hKxUpqpCK2sM+GQBsI8fuiv6vbEtmsF1M/n0xbwI5oTPjO1RVkx4frEeHWjjxo+v
GWrIBp5OLzTVprsPeQlzMQ30jtCJZ7mUhC1Lif9CKTDtQPSiOXDSEOWUxVXwXe5e
IMwjymU5kd+JLWMb9KlzZ0vfm544/3dBj46AZljGfkJjrPjT/woaFsmeIS0Wusc5
FGkLtg8q0f/u+/YSgmeFPG8UYH5z/aJudUePi6+kNaPTQ1NUJgS4FcEf1P9EU0OK
A7LLCkuzN5zbHPpksqISf/Ea4lxDuqT/NRPg/B8W1gWqgJzsuT2wm+cvLgJ+I1Oj
m3PzdErYTxe6z/25o2V8hZtHusPT1up69AhIf9MXXwG2h/uq1xzXdtWZ76s/Wdp4
PJ6p6o5LD3xa36XUv1SQJBRKRJSn7A/tRSgFQBMmPXHH4H+9/7lbWtPr/6QvPYUa
ZZ726va8bldTE5gvCKZbdQHaJ3/G3996GeatYMbcHbOa7QpmmYiqLv7NsN5VSLSG
cINFE9kLIL1LMXemovlHOb7xqJRq1htZJXFbHNyhGuCf85cvjxgKuYGM8/wJ4TdW
PSLNuyOCFvhH11DnWK+J
=wMf4
-----END PGP SIGNATURE-----


Reply to: