Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2015:1526-01] Important: java-1.6.0-openjdk security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Important: java-1.6.0-openjdk security update

Advisory ID: RHSA-2015:1526-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1526.html

Issue date: 2015-07-30

CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621

CVE-2015-2625 CVE-2015-2628 CVE-2015-2632

CVE-2015-2808 CVE-2015-4000 CVE-2015-4731

CVE-2015-4732 CVE-2015-4733 CVE-2015-4748

CVE-2015-4749 CVE-2015-4760

=====================================================================

 

1. Summary:

 

Updated java-1.6.0-openjdk packages that fix multiple security issues are

now available for Red Hat Enterprise Linux 5, 6, and 7.

 

Red Hat Product Security has rated this update as having Important security

impact. Common Vulnerability Scoring System (CVSS) base scores, which give

detailed severity ratings, are available for each vulnerability from the

CVE links in the References section.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux (v. 5 server) - i386, x86_64

Red Hat Enterprise Linux Client (v. 7) - x86_64

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64

Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64

Red Hat Enterprise Linux HPC Node (v. 6) - x86_64

Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64

Red Hat Enterprise Linux Server (v. 6) - i386, x86_64

Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64

Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

Red Hat Enterprise Linux Workstation (v. 7) - x86_64

Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

 

3. Description:

 

The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime

Environment and the OpenJDK 6 Java Software Development Kit.

 

Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI

components in OpenJDK. An untrusted Java application or applet could use

these flaws to bypass Java sandbox restrictions. (CVE-2015-4760,

CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)

 

A flaw was found in the way the Libraries component of OpenJDK verified

Online Certificate Status Protocol (OCSP) responses. An OCSP response with

no nextUpdate date specified was incorrectly handled as having unlimited

validity, possibly causing a revoked X.509 certificate to be interpreted as

valid. (CVE-2015-4748)

 

It was discovered that the JCE component in OpenJDK failed to use constant

time comparisons in multiple cases. An attacker could possibly use these

flaws to disclose sensitive information by measuring the time used to

perform operations using these non-constant time comparisons.

(CVE-2015-2601)

 

A flaw was found in the RC4 encryption algorithm. When using certain keys

for RC4 encryption, an attacker could obtain portions of the plain text

from the cipher text without the knowledge of the encryption key.

(CVE-2015-2808)

 

Note: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by

default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug

1207101, linked to in the References section, for additional details about

this change.

 

A flaw was found in the way the TLS protocol composed the Diffie-Hellman

(DH) key exchange. A man-in-the-middle attacker could use this flaw to

force the use of weak 512 bit export-grade keys during the key exchange,

allowing them to decrypt all traffic. (CVE-2015-4000)

 

Note: This update forces the TLS/SSL client implementation in OpenJDK to

reject DH key sizes below 768 bits, which prevents sessions to be

downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,

linked to in the References section, for additional details about this

change.

 

It was discovered that the JNDI component in OpenJDK did not handle DNS

resolutions correctly. An attacker able to trigger such DNS errors could

cause a Java application using JNDI to consume memory and CPU time, and

possibly block further DNS resolution. (CVE-2015-4749)

 

Multiple information leak flaws were found in the JMX and 2D components in

OpenJDK. An untrusted Java application or applet could use this flaw to

bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)

 

A flaw was found in the way the JSSE component in OpenJDK performed X.509

certificate identity verification when establishing a TLS/SSL connection to

a host identified by an IP address. In certain cases, the certificate was

accepted as valid if it was issued for a host name to which the IP address

resolves rather than for the IP address. (CVE-2015-2625)

 

All users of java-1.6.0-openjdk are advised to upgrade to these updated

packages, which resolve these issues. All running instances of OpenJDK Java

must be restarted for the update to take effect.

 

4. Solution:

 

Before applying this update, make sure all previously released errata

relevant to your system have been applied.

 

For details on how to apply this update, refer to:

 

https://access.redhat.com/articles/11258

 

5. Bugs fixed (https://bugzilla.redhat.com/):

 

1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher

1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks

1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)

1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)

1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)

1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)

1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)

1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)

1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)

1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)

1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)

1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)

1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)

1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)

 

6. Package List:

 

Red Hat Enterprise Linux Desktop (v. 5 client):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm

 

i386:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

 

Red Hat Enterprise Linux (v. 5 server):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm

 

i386:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

 

Red Hat Enterprise Linux Desktop (v. 6):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm

 

i386:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Desktop Optional (v. 6):

 

i386:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux HPC Node (v. 6):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux HPC Node Optional (v. 6):

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Server (v. 6):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm

 

i386:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Server Optional (v. 6):

 

i386:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Workstation (v. 6):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm

 

i386:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Workstation Optional (v. 6):

 

i386:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm

 

Red Hat Enterprise Linux Client (v. 7):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux Client Optional (v. 7):

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux ComputeNode (v. 7):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux Server (v. 7):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm

 

ppc64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

 

s390x:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux Server Optional (v. 7):

 

ppc64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm

 

s390x:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.s390x.rpm

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux Workstation (v. 7):

 

Source:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm

 

x86_64:

java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

Red Hat Enterprise Linux Workstation Optional (v. 7):

 

x86_64:

java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/

 

7. References:

 

https://access.redhat.com/security/cve/CVE-2015-2590

https://access.redhat.com/security/cve/CVE-2015-2601

https://access.redhat.com/security/cve/CVE-2015-2621

https://access.redhat.com/security/cve/CVE-2015-2625

https://access.redhat.com/security/cve/CVE-2015-2628

https://access.redhat.com/security/cve/CVE-2015-2632

https://access.redhat.com/security/cve/CVE-2015-2808

https://access.redhat.com/security/cve/CVE-2015-4000

https://access.redhat.com/security/cve/CVE-2015-4731

https://access.redhat.com/security/cve/CVE-2015-4732

https://access.redhat.com/security/cve/CVE-2015-4733

https://access.redhat.com/security/cve/CVE-2015-4748

https://access.redhat.com/security/cve/CVE-2015-4749

https://access.redhat.com/security/cve/CVE-2015-4760

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11

https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2015 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1

 

iD8DBQFVulvzXlSAg2UNWIIRAmaeAJoCxD34LErxdkOHHsYpS21hu8NJ7ACgnbxy

AM58F212G/DZWyApoAfiS38=

=UmAX

-----END PGP SIGNATURE-----

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×