Red Hat 9037 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 3
Advisory ID: RHSA-2006:0132-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0132.html
Issue date: 2006-03-07
Updated on: 2006-03-07
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-0095
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4. This is the
third regular update.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the third regular kernel update to Red Hat Enterprise Linux 4.

New features introduced in this update include:

- - Open InfiniBand (OpenIB) support

- - Serial Attached SCSI support

- - NFS access control lists, asynchronous I/O

- - IA64 multi-core support and sgi updates

- - Large SMP CPU limits increased using the largesmp kernel: Up to 512 CPUs
in ia64, 128 in ppc64, and 64 in AMD64 and Intel EM64T

- - Improved read-ahead performance

- - Common Internet File System (CIFS) update

- - Device mapper mirroring

- - Error Detection and Correction (EDAC) modules

- - Unisys support

There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

The following security bug was fixed in this update:

- - dm-crypt did not clear a structure before freeing it, which could allow
local users to discover information about cryptographic keys (CVE-2006-0095)

The following device drivers have been upgraded to new versions:

cciss: 2.6.8 to 2.6.8-rh1
ipmi_devintf: 33.4 to 33.11
ipmi_msghandler: 33.4 to 33.11
ipmi_poweroff: 33.4 to 33.11
ipmi_si: 33.4 to 33.11
ipmi_watchdog: 33.4 to 33.11
mptbase: 3.02.18 to 3.02.60.01rh
e1000: 6.0.54-k2-NAPI to 6.1.16-k2-NAPI
ixgb: 1.0.95-k2-NAPI to 1.0.100-k2-NAPI
tg3: 3.27-rh to 3.43-rh
aacraid: 1.1.2-lk2 to 1.1-5[2412]
ahci: 1.01 to 1.2
ata_piix: 1.03 to 1.05
iscsi_sfnet: 4:0.1.11-1 to 4:0.1.11-2
libata: 1.11 to 1.20
qla2100: 8.01.00b5-rh2 to 8.01.02-d3
qla2200: 8.01.00b5-rh2 to 8.01.02-d3
qla2300: 8.01.00b5-rh2 to 8.01.02-d3
qla2322: 8.01.00b5-rh2 to 8.01.02-d3
qla2xxx: 8.01.00b5-rh2 to 8.01.02-d3
qla6312: 8.01.00b5-rh2 to 8.01.02-d3
sata_nv: 0.6 to 0.8
sata_promise: 1.01 to 1.03
sata_svw: 1.06 to 1.07
sata_sx4: 0.7 to 0.8
sata_vsc: 1.0 to 1.1
cifs: 1.20 to 1.34

Added drivers:

bnx2: 1.4.25
dell_rbu: 0.7
hangcheck-timer: 0.9.0
ib_mthca: 0.06
megaraid_sas: 00.00.02.00
qla2400: 8.01.02-d3
typhoon: 1.5.7

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

108616 - RHEL4 (IPF): Support for Additional function in Intel's Monticeto processor (HW)
108827 - RHEL4: Infiniband support
131889 - RHEL4 U2: SATA ATAPI support (including ESB2)
139949 - sym driver creates voluminous /var/log/messages entries
141699 - FEAT: RHEL 4 U3: ia64 needs hint@pause in spinloop
141851 - spin loops on both ia32 and ia32e need cpu_relax
144477 - bonding mode=6 + dhcp doesn't work correctly
144703 - ia32 apps that are not large file aware can access files >= 4GB
145061 - SMART support in SATA driver (P1)
149294 - qlogic fabric rediscovery functionality missing
150893 - On few Nocona based platforms, acpi-cpufreq driver assumes the wrong CPU freq at boot time
151549 - RHEL 4 Kernel does not provide ACL support over NFS
152036 - Amanda hangs on backup in case of ip_conntrack_amanda is used (RHEL4)
153971 - large usb flash drive require reboot to mount more than once
154387 - umount fails on nfs server side when nfs client does heavy io
155017 - Unisys' x86_64 ES7000 loses legacy devices during boot when using latest ES7000 platform code
156437 - Writing large file to 1TB ext3 volume sometimes very slow
156602 - SCTP memory consumption, additional fixes
156785 - Missing SHUTDOWN notification with SCTP stream socket
157241 - [RHEL4-U3] PCI Hotplug - Slot powered off after enabling
157586 - ES7000 systems won't boot with large configuration
159869 - Diskdump fails through ipr driver
160308 - USB Key stops working after upgrade to U1
160844 - dangling POSIX locks after close
161101 - Assertion failure in journal_commit_transaction() at fs/jbd/commit.c:790: "jh->b_next_transaction == ((void *)0)"
161362 - Oracle Hangs with directio and aio using NFS
161597 - sysfs_remove_dir() de-references NULL pointer
161617 - RHEL4 Panics at smp_apic_timer_interrupt
161846 - Problem with b44: SIOCSIFFLAGS: Cannot allocate memory
162094 - read() with count > 0xffffffff panics kernel at fs/direct-io.c:886
162731 - [RHEL4] 'getpriority/setpriority' broken with PRIO_USER, who=0
162732 - io_cancel doesn't work properly
162759 - System occasionally experienced system hangs.
162814 - Assertion failure in log_do_checkpoint
163150 - request backport of fc transport class HBA port_id for dm-multipath
163738 - Kernel PANIC - not syncing: fatal exception
163741 - qetharp 'Operation not supported' on non-layer2 guestlan
164298 - PANIC at rpc_wake_up_status
164547 - Bug in IPv6 address adding error path
165018 - Bonding driver fails to switch to backup link
165092 - Bugs in kernel key managment syscall interface
165154 - Bad order for release_region in error exit from i810_probe
165741 - acct does not have Large File Support
165744 - 2.6: /sbin/service iptables stop hangs on modprobe -r ipt_state
165959 - NFS/RPC - timestamp conversion is wrong
166454 - rpmbuild --rebuild glibc-2.3.4-2.12.src.rpm hangs (same problem with glibc-2.3.4-2.9.src.rpm)
166524 - Erratic behaviour when system fd limit reached
166544 - 2.6.9-16.ELsmp null pointer dereference in __bounce_end_io_read on x86_64
166589 - mount/umount can cause the block device reads to fail
166880 - [RHEL4 U1] OOPS removing ahci driver
167115 - [RHEL4 U1] Bonding driver does not switch to backup interface upon active interface failure under heavy UDP traffic
167192 - NFSv3 locking misses important kernel patches
167211 - RHEL4 Panic in __wake_up_common (networking)
167630 - Multicast domain membership doesn't follow bonding failover
167634 - RHEL4 __copy_user breaks on unaligned src
167645 - RHEL4 U2 performance regression running enterprise workload
167730 - FEAT RHEL4 U3: 10GigE Neterion Driver Update (S2io)
167731 - [RHEL4] hangcheck-timer not compiled in RHEL4 on IA64
167907 - SCTP association restart problem, possible backport
168090 - ipmi_poweroff driver update for Dell <8G servers
168262 - [RHEL4 U1][diskdump] Diskdump from OS_INIT fails.
168431 - autofs removes leading path components of /net mounts on timeout
168483 - FEAT: [RHEL4 U3] kernel dm: Statistic information about dm devices (*)
168775 - wait() and waitpid() return inconsistencies under high load
168824 - [FEAT:][RHEL 4 U3]LVM2 Snapshot support of root
169042 - [Texas Instruments] nfs bindresvport: Address already in use
169149 - oops in gss_pipe_release()
169184 - ls hangs on krb5 mountd when user has not kinit-ed
169197 - NFS client oops when debugging is on
170146 - CRM648268: kernel reporting init process cutime as very large negative value
170423 - Cache invalidation bug in nfs v3
170487 - Bad: kernel panic on boot (kernel-2.6.9-22.EL)
170546 - kernel_lock() problem through NFS mount
170656 - iSCSI connection recovery uses session address instead of portal address
170864 - device-mapper mirroring backwards compatibility issue
170887 - Neterion(S2io) adapter not functional after running offline diagnostics
170985 - RHEL 4 Update 2 Incompatibility with VMware ESX 2.5.2
171060 - Marvell Yukon 88E8050 ethernet interface not supported
171112 - Kernel oops killing process with open files on a NFS3 krb5 mount after /var/lib/nfs/rpc_pipefs has been unmounted
171141 - FEAT RHEL4 U3 [diskdump]: kernel - support compressing dump data
171220 - USB: khubd deadlock on error path
171705 - Kernel key management facility improvements
171715 - nfsd: clear signals before exiting the nfsd() thread
171765 - linux-2.6.13-key-reiserfs.patch is incomplete
171950 - Can't reboot on IBM xSeries 236.
171985 - rhel4 u2 - Null pointer dereference in alc880_auto_fill_dac_nids
171989 - rhel4 modules loading signing issue
172081 - rename(2) onto an empty directory fails on NFS file systems
172214 - Large LUNS can't be seen with Hitachi Open-L SAN
172393 - No analog audio with the "Intel Corporation Enterprise Southbridge High Definition Audio (rev 08)"
172487 - Difficulty with some iSCSI targets in iscsi_sfnet
172595 - netpoll can dereference a null pointer, causing a system crash
172598 - [RHEL4] tuxstat SIGSEGV
172839 - NMI watchdog panic during cache_alloc_refill with corrupt size-128 slabcache
172892 - kernel dm: dm-ioctl memory leak on attempt to load non-existing mapping
172920 - Lock at "Initializing hardware... storage network" caused by ULi HD Audio controller enabled.
172986 - autofs doesn't remount if nfs server is unreachable at expire time
173155 - kernel dm: DM_LIST_VERSIONS_CMD ioctl reponse truncated
173156 - kernel dm: Notify userspace when a device is renamed.
173157 - kernel dm-log: big endian 64-bit corruption
173158 - kernel dm-log: Make mirror log arch-independent
173159 - kernel dm: move bdget outside lockfs
173161 - kernel dm: Make lock_fs optional.
173163 - kernel dm snapshot: Separate out metadata reading.
173164 - kernel dm snapshot: Load metadata on table creation not resumption.
173166 - kernel dm snapshot: Reduce PF_MEMALLOC usage
173174 - kernel dm multipath: Fix do_end_io locking.
173194 - race condition when expiring ghosted autofs mounts
173206 - kernel dm snapshot: bio_list_merge fix
173304 - Fix for SystemTap bugzilla #1345 - return probe on do_execve
173354 - unable to create sgi_sn/ptc_statistics" printed to the console
173486 - Further key management facility improvements
173493 - Permit key management to request already running process to instantiate a key
173912 - GFS deadlock - gfs_write (do_write_direct) and gfs_setattr (do_truncate)
173981 - kernel bug at mm/prio_tree.c
174427 - SCSI errors with latest qlogic driver
174760 - Provide support for more than 8 logical processors
174895 - System became unresponsive to local commands.
175123 - Diskdump overwrite by SATA update
175132 - Audit fails to record syscall failures when asked to via auditctl
175415 - [audit][PATCH] New user space message types
175680 - broken U3 modsyms
175687 - autofs doesn't attempt to remount failed mount points
175728 - Kernel panic. Server hangs and is totally unresponsive until a power cycle brings it back online.
175812 - setxattr() to a file on NFS returns EIO
175988 - hang-check timer needs to be build on S390/S390x
176825 - broken memsets in s390 drivers.
177031 - device-mapper mirror log: avoid overrun while syncing
177136 - CVE-2006-0095 dm-crypt key leak
177445 - Please consider upping NR_CPUS to 16 for x86_64
177492 - Early panic in "io_apic_get_unique_id" on 4CPU, dual-core HT enabled EM64T System
177522 - Kernel panic while running NFS ACL test
177527 - Add aic94xx and sas code into RHEL4 U3
177561 - Largesmp kernel does not see all logical CPUs on IBM x460
177620 - kernel device-mapper snapshot: barriers are not supported
177634 - AIM7 File Server Performance -15% relative to U2
177719 - BIOS bug shows the wrong number of CPUs
178839 - CPU's being incorrectly numbered
178975 - /proc/cpuinfo shows wrong value
179057 - SCSI LLDD's oops on rmmod if devices scan w/ PQ=3
179751 - lvremove panic in dm_mod:kcopyd_client_destroy while attempting to remove a snapshot
180353 - NPTL: under xterm -e process receives SIGHUP when child thread exits
180405 - kabi violation in multi-core detection patch
181574 - device-mapper mirror removal stuck on kcopyd_client_destroy (pvmove hangs)
181884 - RHEL4 U3 "noht" boot parameter sometimes disables dual core support as well as ht support


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-34.EL.src.rpm
969780046bc8a7f7d33e6eb73477c35e kernel-2.6.9-34.EL.src.rpm

i386:
2064a3c58b05e968679207687dbc4298 kernel-2.6.9-34.EL.i686.rpm
46608bf806692c1646d89c6c1355dbf5 kernel-devel-2.6.9-34.EL.i686.rpm
a397a5ec8ef28298565091bb8c671c05 kernel-hugemem-2.6.9-34.EL.i686.rpm
5df428f24b225b21ae93fad89a2e5eb1 kernel-hugemem-devel-2.6.9-34.EL.i686.rpm
6e01fc2120b5124c16d8adc7b970739a kernel-smp-2.6.9-34.EL.i686.rpm
0880e12ccbbbcbff6959dbbc447dbb3b kernel-smp-devel-2.6.9-34.EL.i686.rpm

ia64:
91971bcda1453b7c47410733681a0ddb kernel-2.6.9-34.EL.ia64.rpm
46302dee1262b2d19e3020991185f73a kernel-devel-2.6.9-34.EL.ia64.rpm
99f2d93f5d63d16340e5ce69a6f7f974 kernel-largesmp-2.6.9-34.EL.ia64.rpm
4bf73a79f4b617649dced45d8a394f63 kernel-largesmp-devel-2.6.9-34.EL.ia64.rpm

noarch:
cd967a8e145158552f88654d643cf6de kernel-doc-2.6.9-34.EL.noarch.rpm

ppc:
e10d63ac6746fba6e5550eae629d6795 kernel-2.6.9-34.EL.ppc64.rpm
4ed97e3db813003b84a2eeb89dd8b8b3 kernel-2.6.9-34.EL.ppc64iseries.rpm
bb1b102063817e1298fefda9761fdb81 kernel-devel-2.6.9-34.EL.ppc64.rpm
8f57904dce87c0d8157adcb59a178ecd kernel-devel-2.6.9-34.EL.ppc64iseries.rpm
69c5f58101a9d3989366ade5d80bb8a5 kernel-largesmp-2.6.9-34.EL.ppc64.rpm
b04b4db355aec05ddc4b924764d9d959 kernel-largesmp-devel-2.6.9-34.EL.ppc64.rpm

s390:
6aad68668854f1cd731f82e9cc63e3ad kernel-2.6.9-34.EL.s390.rpm
6485150610367322e3cce1be384e50ec kernel-devel-2.6.9-34.EL.s390.rpm

s390x:
46dad8427fa0306934d953e4156df78a kernel-2.6.9-34.EL.s390x.rpm
266d5bdc257d7cedaac57ba5bbbcf8e5 kernel-devel-2.6.9-34.EL.s390x.rpm

x86_64:
64621007fa744fec83d865c5051f3da7 kernel-2.6.9-34.EL.x86_64.rpm
92d147f62c823c6cb7ff093eb49036a1 kernel-devel-2.6.9-34.EL.x86_64.rpm
cfc22b13fabbc9b548ec949d67d79d45 kernel-largesmp-2.6.9-34.EL.x86_64.rpm
a2ef24cc6901dc3dc7ceb42f3884f44e kernel-largesmp-devel-2.6.9-34.EL.x86_64.rpm
15d7ed8513b00f20037219ff0a8e2394 kernel-smp-2.6.9-34.EL.x86_64.rpm
91fe0d58820c367ae72758ed0334a3e4 kernel-smp-devel-2.6.9-34.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-34.EL.src.rpm
969780046bc8a7f7d33e6eb73477c35e kernel-2.6.9-34.EL.src.rpm

i386:
2064a3c58b05e968679207687dbc4298 kernel-2.6.9-34.EL.i686.rpm
46608bf806692c1646d89c6c1355dbf5 kernel-devel-2.6.9-34.EL.i686.rpm
a397a5ec8ef28298565091bb8c671c05 kernel-hugemem-2.6.9-34.EL.i686.rpm
5df428f24b225b21ae93fad89a2e5eb1 kernel-hugemem-devel-2.6.9-34.EL.i686.rpm
6e01fc2120b5124c16d8adc7b970739a kernel-smp-2.6.9-34.EL.i686.rpm
0880e12ccbbbcbff6959dbbc447dbb3b kernel-smp-devel-2.6.9-34.EL.i686.rpm

noarch:
cd967a8e145158552f88654d643cf6de kernel-doc-2.6.9-34.EL.noarch.rpm

x86_64:
64621007fa744fec83d865c5051f3da7 kernel-2.6.9-34.EL.x86_64.rpm
92d147f62c823c6cb7ff093eb49036a1 kernel-devel-2.6.9-34.EL.x86_64.rpm
cfc22b13fabbc9b548ec949d67d79d45 kernel-largesmp-2.6.9-34.EL.x86_64.rpm
a2ef24cc6901dc3dc7ceb42f3884f44e kernel-largesmp-devel-2.6.9-34.EL.x86_64.rpm
15d7ed8513b00f20037219ff0a8e2394 kernel-smp-2.6.9-34.EL.x86_64.rpm
91fe0d58820c367ae72758ed0334a3e4 kernel-smp-devel-2.6.9-34.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-34.EL.src.rpm
969780046bc8a7f7d33e6eb73477c35e kernel-2.6.9-34.EL.src.rpm

i386:
2064a3c58b05e968679207687dbc4298 kernel-2.6.9-34.EL.i686.rpm
46608bf806692c1646d89c6c1355dbf5 kernel-devel-2.6.9-34.EL.i686.rpm
a397a5ec8ef28298565091bb8c671c05 kernel-hugemem-2.6.9-34.EL.i686.rpm
5df428f24b225b21ae93fad89a2e5eb1 kernel-hugemem-devel-2.6.9-34.EL.i686.rpm
6e01fc2120b5124c16d8adc7b970739a kernel-smp-2.6.9-34.EL.i686.rpm
0880e12ccbbbcbff6959dbbc447dbb3b kernel-smp-devel-2.6.9-34.EL.i686.rpm

ia64:
91971bcda1453b7c47410733681a0ddb kernel-2.6.9-34.EL.ia64.rpm
46302dee1262b2d19e3020991185f73a kernel-devel-2.6.9-34.EL.ia64.rpm
99f2d93f5d63d16340e5ce69a6f7f974 kernel-largesmp-2.6.9-34.EL.ia64.rpm
4bf73a79f4b617649dced45d8a394f63 kernel-largesmp-devel-2.6.9-34.EL.ia64.rpm

noarch:
cd967a8e145158552f88654d643cf6de kernel-doc-2.6.9-34.EL.noarch.rpm

x86_64:
64621007fa744fec83d865c5051f3da7 kernel-2.6.9-34.EL.x86_64.rpm
92d147f62c823c6cb7ff093eb49036a1 kernel-devel-2.6.9-34.EL.x86_64.rpm
cfc22b13fabbc9b548ec949d67d79d45 kernel-largesmp-2.6.9-34.EL.x86_64.rpm
a2ef24cc6901dc3dc7ceb42f3884f44e kernel-largesmp-devel-2.6.9-34.EL.x86_64.rpm
15d7ed8513b00f20037219ff0a8e2394 kernel-smp-2.6.9-34.EL.x86_64.rpm
91fe0d58820c367ae72758ed0334a3e4 kernel-smp-devel-2.6.9-34.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-34.EL.src.rpm
969780046bc8a7f7d33e6eb73477c35e kernel-2.6.9-34.EL.src.rpm

i386:
2064a3c58b05e968679207687dbc4298 kernel-2.6.9-34.EL.i686.rpm
46608bf806692c1646d89c6c1355dbf5 kernel-devel-2.6.9-34.EL.i686.rpm
a397a5ec8ef28298565091bb8c671c05 kernel-hugemem-2.6.9-34.EL.i686.rpm
5df428f24b225b21ae93fad89a2e5eb1 kernel-hugemem-devel-2.6.9-34.EL.i686.rpm
6e01fc2120b5124c16d8adc7b970739a kernel-smp-2.6.9-34.EL.i686.rpm
0880e12ccbbbcbff6959dbbc447dbb3b kernel-smp-devel-2.6.9-34.EL.i686.rpm

ia64:
91971bcda1453b7c47410733681a0ddb kernel-2.6.9-34.EL.ia64.rpm
46302dee1262b2d19e3020991185f73a kernel-devel-2.6.9-34.EL.ia64.rpm
99f2d93f5d63d16340e5ce69a6f7f974 kernel-largesmp-2.6.9-34.EL.ia64.rpm
4bf73a79f4b617649dced45d8a394f63 kernel-largesmp-devel-2.6.9-34.EL.ia64.rpm

noarch:
cd967a8e145158552f88654d643cf6de kernel-doc-2.6.9-34.EL.noarch.rpm

x86_64:
64621007fa744fec83d865c5051f3da7 kernel-2.6.9-34.EL.x86_64.rpm
92d147f62c823c6cb7ff093eb49036a1 kernel-devel-2.6.9-34.EL.x86_64.rpm
cfc22b13fabbc9b548ec949d67d79d45 kernel-largesmp-2.6.9-34.EL.x86_64.rpm
a2ef24cc6901dc3dc7ceb42f3884f44e kernel-largesmp-devel-2.6.9-34.EL.x86_64.rpm
15d7ed8513b00f20037219ff0a8e2394 kernel-smp-2.6.9-34.EL.x86_64.rpm
91fe0d58820c367ae72758ed0334a3e4 kernel-smp-devel-2.6.9-34.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0095

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEDa2CXlSAg2UNWIIRAmJQAKCLCgUj9N/PBpuoDddQqT3oaUzjjQCfQazI
j4JlZT0lexITrKGU7mr8UtA=
=JIKh
-----END PGP SIGNATURE-----