Alert GCSA-13007 - Oracle Critical Patch Update Advisory (January
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13007
Data : 16 Gennaio 2013
Titolo : Oracle Critical Patch Update Advisory (January 2013)
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update January 2013.
L'aggiornamento e' una collezione di patch che risolvono difetti
di sicurezza e non, presenti in vari prodotti e componenti Oracle.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3
Oracle Database 11g Release 1, version 11.1.0.7
Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5
Oracle Database Mobile Server, version 11.1.0.0
Oracle Database Lite Server, version 10.3.0.3
Oracle Access Manager/Webgate, versions 10.1.4.3.0, 11.1.1.5.0, 11.1.2.0.0
Oracle GoldenGate Veridata, version 3.0.0.11.0
Management Pack for Oracle GoldenGate, version 11.1.1.1.0
Oracle Outside In Technology, versions 8.3.7, 8.4
Oracle WebLogic Server, versions 9.2.4, 10.0.2, 10.3.5, 10.3.6, 12.1.1
Application Performance Management versions 6.5, 11.1, 12.1.0.2
Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1
Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5
Enterprise Manager Plugin for Database 12c Release 1, versions 12.1.0.1,
12.1.0.2
Oracle E-Business Suite Release 12, versions 12.0.6, 12.1.1, 12.1.2, 12.1.3
Oracle E-Business Suite Release 11i, version 11.5.10.2
Oracle Agile PLM Framework, version 9.3.1.1
Oracle PeopleSoft HRMS, versions 9.0, 9.1
Oracle PeopleSoft PeopleTools, versions 8.51, 8.52
Oracle JD Edwards EnterpriseOne Tools, versions 8.9, 9.1, SP24
Oracle Siebel CRM, versions 8.1.1, 8.2.2
Oracle Sun Product Suite
Oracle VM VirtualBox, versions 4.0, 4.1, 4.2
Oracle MySQL Server, versions 5.1.66 and earlier, 5.5.28 and earlier
:: Impatto
L'impatto di queste vulnerabilita' varia a seconda del prodotto,
della componente e della configurazione del sistema.
Tra le potenziali conseguenze vi sono attacchi di tipo:
Denial of Service
Manipolazione di dati
Accesso al sistema
Attacchi SQL injection
Esecuzione remota di codice arbitrario
Esposizione di informazioni sensibili
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno
aggiornamento secondo le istruzioni rilasciate da Oracle
(vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - January 2013
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
SecurityFocus
http://www.securityfocus.com/cgi-bin/index.cgi?o=30&l=30&c=12&op=display_list&vendor=Oracle&version=&title=&CVE=
Secunia
http://secunia.com/advisories/51880/
http://secunia.com/advisories/51879/
http://secunia.com/advisories/51878/
http://secunia.com/advisories/51888/
http://secunia.com/advisories/51886/
http://secunia.com/advisories/51887/
http://secunia.com/advisories/51890/
http://secunia.com/advisories/51891/
http://secunia.com/advisories/51894/
http://secunia.com/advisories/51876/
http://secunia.com/advisories/51884/
http://secunia.com/advisories/51877/
http://secunia.com/advisories/51893/
http://secunia.com/advisories/51889/
http://secunia.com/advisories/50121/
http://secunia.com/advisories/51892/
http://secunia.com/advisories/51875/
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1678
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1700
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1755
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3219
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3220
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0374
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0382
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0397
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0420
-----BEGIN PGP SIGNATURE-----
iD8DBQFQ9tcWwZxMk2USYEIRAv3+AKDIE3diWXEfOfRJ3YUAK3kMkxAMXgCg0RAn
U4uqS5dpA6cVBq7BhMpx0y0=
=JpEn
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13007
Data : 16 Gennaio 2013
Titolo : Oracle Critical Patch Update Advisory (January 2013)
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update January 2013.
L'aggiornamento e' una collezione di patch che risolvono difetti
di sicurezza e non, presenti in vari prodotti e componenti Oracle.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3
Oracle Database 11g Release 1, version 11.1.0.7
Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5
Oracle Database Mobile Server, version 11.1.0.0
Oracle Database Lite Server, version 10.3.0.3
Oracle Access Manager/Webgate, versions 10.1.4.3.0, 11.1.1.5.0, 11.1.2.0.0
Oracle GoldenGate Veridata, version 3.0.0.11.0
Management Pack for Oracle GoldenGate, version 11.1.1.1.0
Oracle Outside In Technology, versions 8.3.7, 8.4
Oracle WebLogic Server, versions 9.2.4, 10.0.2, 10.3.5, 10.3.6, 12.1.1
Application Performance Management versions 6.5, 11.1, 12.1.0.2
Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1
Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5
Enterprise Manager Plugin for Database 12c Release 1, versions 12.1.0.1,
12.1.0.2
Oracle E-Business Suite Release 12, versions 12.0.6, 12.1.1, 12.1.2, 12.1.3
Oracle E-Business Suite Release 11i, version 11.5.10.2
Oracle Agile PLM Framework, version 9.3.1.1
Oracle PeopleSoft HRMS, versions 9.0, 9.1
Oracle PeopleSoft PeopleTools, versions 8.51, 8.52
Oracle JD Edwards EnterpriseOne Tools, versions 8.9, 9.1, SP24
Oracle Siebel CRM, versions 8.1.1, 8.2.2
Oracle Sun Product Suite
Oracle VM VirtualBox, versions 4.0, 4.1, 4.2
Oracle MySQL Server, versions 5.1.66 and earlier, 5.5.28 and earlier
:: Impatto
L'impatto di queste vulnerabilita' varia a seconda del prodotto,
della componente e della configurazione del sistema.
Tra le potenziali conseguenze vi sono attacchi di tipo:
Denial of Service
Manipolazione di dati
Accesso al sistema
Attacchi SQL injection
Esecuzione remota di codice arbitrario
Esposizione di informazioni sensibili
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno
aggiornamento secondo le istruzioni rilasciate da Oracle
(vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - January 2013
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
SecurityFocus
http://www.securityfocus.com/cgi-bin/index.cgi?o=30&l=30&c=12&op=display_list&vendor=Oracle&version=&title=&CVE=
Secunia
http://secunia.com/advisories/51880/
http://secunia.com/advisories/51879/
http://secunia.com/advisories/51878/
http://secunia.com/advisories/51888/
http://secunia.com/advisories/51886/
http://secunia.com/advisories/51887/
http://secunia.com/advisories/51890/
http://secunia.com/advisories/51891/
http://secunia.com/advisories/51894/
http://secunia.com/advisories/51876/
http://secunia.com/advisories/51884/
http://secunia.com/advisories/51877/
http://secunia.com/advisories/51893/
http://secunia.com/advisories/51889/
http://secunia.com/advisories/50121/
http://secunia.com/advisories/51892/
http://secunia.com/advisories/51875/
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1677
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1678
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1700
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1755
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3219
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3220
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0374
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0382
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0397
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0420
-----BEGIN PGP SIGNATURE-----
iD8DBQFQ9tcWwZxMk2USYEIRAv3+AKDIE3diWXEfOfRJ3YUAK3kMkxAMXgCg0RAn
U4uqS5dpA6cVBq7BhMpx0y0=
=JpEn
-----END PGP SIGNATURE-----