5 td> ]td> 机密性影响:td> td> [--]td> 可漏影响:td> td> [--]td> 攻击向量:td> td> [--]td> CWE (点类目)ulh2 order="0" wiign="center" cl="tesw> href="http://wwwikicap.org.cn/cwe_o//cwdefinion.j/189titge l"28_blankC CPE (受影响平台与产品)ulh2 hble bo="tespecldth="369"> order="0" wiign="center" ctr>
CVE-2006-3082
CVSS5.0
发布时间 :2006-06-19 14:02:00
修订时间 :2017-07-19 21:32:01
NMCOPS    

[原文]parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could leadge spa wi6pan" 1Qge 4gth (loly eNVD tb0oss2ng) wi6--> no-arry oion" .

0" cl/

rg.cn/a>5.[NVD]span>uPG parse-packet.c 远程缓冲区溢出漏洞" stylrg u>( href="http://www.scnvd">rg.cn/a/vnerabilitiey/show/cvnnvd">id/NVD006-3-30874titge l"28_blankC no-arry 选项。

="dd-break:break-all; ">spe:/a:gnupg:gnupg:4.3 atd>uPG pa(Privacy Guard1.4.3 atd>
="dd-break:break-all; ">spe:/a:gnupg:gnupg:4.20, td>uPG pa(Privacy Guard1.4.20, td>
AL order="0" wiign="center" ctr> href="http://oval.scap.org.cn/inal.s_g.cntre">.al.s_def_10089tml" t>al.s:g.cntre">.al.s:def:10089a> d aldth="3"7"> rse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and pos...td>*AL 官方据已接" ulh2 hble bo=" teafficl of="cldth="369"> order="0" wiign="center" ct .arg/cgi-binve.sme=".cgi?me="CE-2006-3082.arg/cgi-binve.sme=".cgi?me="CE-2006-3082 href="http://wwweb.d">rnist.gov/ew.h/vnerwdetail?vnerIdCE-2006-3082rnist.gov/ew.h/vnerwdetail?vnerIdCE-2006-3082> href="http://www.scnvd">rg.cn/a/vnerabilitiey/show/cvnnvd">id/NVD006-3-30874titge l"28_blankCrg.cn/a/vnerabilitiey/show/cvnnvd">id/NVD006-3-30874a> 其它接" 访源ulh2 hble bo="tef="erencecldth="369"> order="0" wiign="center" ctr>om/csch -ive/1sch -ive/1s438751/100/0/tef=adedtitge l"28_blankCom/csch -ive/1sch -ive/1s438751/100/0/tef=adeda>om/csbid/18554titge l"28_blankCom/csbid/18554a> C tr td label { width: 80px; float: left; font-weight: bold; } testyle> ') class="dbpP<-span> 洞与息 order="0" wiign="center" cl="teinfonnvd">ct el {>洞库称:el {>uPG parse-packet.c 远程缓冲区溢出漏洞" st> h>el {>洞类型:td>el {>冲区溢出td> >el {>布时期:td>el {>06-06-19 1400:00:00td> h>el {>新期:td>el {>06-06-7617400:00:00 td> >el {>攻击路径:td>el {>程td> bsp; >el {>详细介绍:td>el {>td> bsp;  no-arry 选项。 ') class="dbpP<-span> 公告评丁ulh2 hble bodth="3698> order="0" wiign="center" cl="tebulletinnnvd">c P< order="0" wiign="center" c el {>洞库称:el {>Debian Linux /urityFo Advisory 1115-1 curityfotm/csfis/sy48462/titge l"28_blankC<(/ketStormID:F48462)a> >el {>布时期:td>el {> >el {>文件标签:td>el {> >el {>系统标签:td>el {> >el {>告标识:td>el {> > >el {>文件下载:td>el {> curityfotm/csfis/sydownadery48462/dsa-1115-1.txt">[点击下载]a> >el {>洞详情,C:td>el {> Debian /urityFo Advisory 1115-1 - Evgeny Ln" ov discQge ed that gnupg,wi6--GNU privacy guard, a free PGP replacentsBontenn" sa wi6pan" 1Qge 4gth that c clase a desegnt.gion.p ult.cnd possibly overwrite memory via a merge leer ID string),s.

mype="aaa: catil (mote a) Debian-specificnone E-2D staaaaaaaa: E-2006-3082 myhas beep ued; i6p rsions,.4.3 1-1.sge l4f seuPG (gd poin rsions,.4.9.15-6sge l1f seuPG (2. Forwi6--unsble bodisingbuon.p (sid)wi6is proe> myhas beep ued; i6p rsions,.4.3 3-2f seuPG (, a fix forwuPG (2 is penng=". We remmonenn that you upgrade your gnupgackete p. Upgrade stanruion()s - -------------------- w l" url order="0" wiign="center" c el {>洞库称:el {>Debian Linux /urityFo Advisory 11-761 curityfotm/csfis/sy48170/titge l"28_blankC<(/ketStormID:F48170)a> >el {>布时期:td>el {> >el {>文件标签:td>el {> >el {>系统标签:td>el {> >el {>告标识:td>el {> > >el {>文件下载:td>el {> curityfotm/csfis/sydownadery48170/dsa-1107-1.txt">[点击下载]a> >el {>洞详情,C:td>el {> Debian /urityFo Advisory 11-761 - Evgeny Ln" ov discQge ed that gnupg,wi6--GNU privacy guard, a free PGP replacentsBontenn" sa wi6pan" 1Qge 4gth that c clase a desegnt.gion.p ult.cnd possibly overwrite memory via a merge leer ID string),s.

mype="aaa: catil (mote a) Debian-specificnone E-2D staaaaaaaa: E-2006-3082 myhas beep ued; i6p rsions,.4.0.6-4woody6. Forwi6--sble bodisingbuon.p (sge l)wi6is proe> myhas beep ued; i6p rsions,.4.3 1-1.sge l4. Forwi6--unsble bodisingbuon.p (sid)wi6is proe> myhas beep ued; i6p rsions,.4.3 3-2. We remmonenn that you upgrade your gnupgackete p. Upgrade stanruion()s - -------------------- w l" url order="0" wiign="center" c el {>洞库称:el {>Ubuntu /urityFo Note (g304-1 curityfotm/csfis/sy47790/titge l"28_blankC<(/ketStormID:F47790)a> >el {>布时期:td>el {> >el {>文件标签:td>el {> >el {>系统标签:td>el {> >el {>告标识:td>el {> > >el {>文件下载:td>el {> curityfotm/csfis/sydownadery47790/USN-304-1.txt">[点击下载]a> >el {>洞详情,C:td>el {> Ubuntu /urityFo Note (g304-1 - Evgeny Ln" ov discQge ed that uPG (gdid nosrcufficlter ovcheckverwr ovrge leer ID stcketsto. Specl o ovcraf0oss2n ID sslase ad a buff" 1Qge 4gth. By ingckg=" cl2n IDorwmote attutomb0osssystemi6p caprocesng) wa inlicious uPG (gssage p,w claackers ould leexploitei6is caush) uPG (gorwssibly ovevep exuri attrbitrary node.

myc clbe correm0ossby upgradg=" your systemi cai6- foows g) wckete p rsions, : Ubuntu 5.04: cript src="/satic/components/syntaxhl/shAuBrushPin" s"> order="0" wiign="center" c el {>洞库称:el {>Mdroiiva Linux /urityFo Advisory 06-3.110 curityfotm/csfis/sy47747/titge l"28_blankC<(/ketStormID:F47747)a> >el {>布时期:td>el {> >el {>文件标签:td>el {> >el {>系统标签:td>el {> >el {>告标识:td>el {> > >el {>文件下载:td>el {> curityfotm/csfis/sydownadery47747/MDKSA006-30110.txt">[点击下载]a> >el {>洞详情,C:td>el {> Mdroiiva Linux /urityFo Advisory MDKSA006-30110 - Aavnerabilitiey was discQge ed in uPG (g4.3 and po9.20, (d poearlier) that cld leaows awmote attackers o cause a gpg caush) d possibly overwrite memory via a message ptcketstidtth merge lelength.

myDeript> ns,: Aavnerabilitiey was discQge ed in uPG (g4.3 and po9.20, (d poearlier) that cld leaows awmote attackers o cause a gpg caush) d possibly o verwrite memory via a message ptcketstidtth merge lelength. T6e upda0ossckete ps have beep nicched to correm0ai6-se issuas. _______________________________________________________________________ R="erences: tp://cvcve.mitre.arg/cgi-bba/cvename.cgi?name=E-2006-3082ad automb0ic o ovforwyou. All pkete ps aressignossby Mdroiiva forwcurityfot You c clobnn" ai6- oG (gpublic key sei6a Mdroiiva /urityFo Teamsby exuri ing: //gpg --remv-keys --keyserrsi pgp.mit.edu 0x22458A98 /You c clview oi6ars2pdate advisories forwMdroiiva Linux at: //tp://cvw.scmdroiivaom/cscurityfo/advisories /If you waeri careportavnerabilitieies, aieaseontennct //surityfo_(at)_mdroiivaom/c _______________________________________________________________________ Te="aBits/Key staaaaDate aaaaaUr ID s gpub 1024D/22458A98 26--6-7610 Mdroiiva /urityFo Team //<surityfo*mdroiivaom/c> -----BEGIN PGP SIGNATURE----- Vsions,:nuPG (gv4.3 2.2n(GNU/Linux) iD8DBQFEmHEJmqjQ0CJFipgRAtVCAKCyVLFVCZTrQGcpPAQYz6c3iZEjPgCgqpX0 GuOteS9filZcv68pum5+BeU= =ywCK/-----END PGP SIGNATURE----- civ> dv cl="teosvdbc el { { dth=": 80px; float:eleft; ften-weight:ebold; } order="0" wiign="center" cl="teinfonosvdbc ="2CVh>el {>OSVDBID:td>el {> ="2CV el {>洞库称:el {>uPG (gparse-cketst.c Lge le/ketSt Length DoStd> el {>利用方式:td>el {> el {>洞影响:td>el {>Lsib seAvaililitiey-d> el {>解决方式:td>el {> tab >el {>洞利用:td>el {>-d> el {>开方式:td>el {> tab ns,') ns,class="dbpP<-span> 洞描述 order="0" wiign="center" cl="teinfondiscpt> ns,c p>UnknowngorwInmponle atdp td> 间线 order="0" wiign="center" cl="teinfontimec el {>发现期:td>el {> el {>利用期:td>el {>Unknowa>> el {>解决期:td>el {>Unknow tab 解决方案 order="0" wiign="center" cl="teinfonsolu ns,c p>UnknowngorwInmponle atdp td> 相关参考 order="0" wiign="center" cl="teinfonf="c ="2CVhul>
  • E-2D s: hhref="http://cvcve.mitre.arg/cgi-bba/cvename.cgi?name=06-3082a> (seeiigso:/hhref="http://cvnvd.nist.govvnvd.cfm?cvename=E-2006-3082a>)
  • /urinia Advisory s: hhref="http://cvsuriniaom/csadvisories/20783/titge l"28_blankC<20783a>a> hhref="http://cvsuriniaom/csadvisories/20801/titge l"28_blankC<20801a>a> hhref="http://cvsuriniaom/csadvisories/20811/titge l"28_blankC<20811a>a> hhref="http://cvsuriniaom/csadvisories/20829/titge l"28_blankC<20829a>a> hhref="http://cvsuriniaom/csadvisories/20881/titge l"28_blankC<20881a>a> hhref="http://cvsuriniaom/csadvisories/20899/titge l"28_blankC<20899a>a> hhref="http://cvsuriniaom/csadvisories/20968/titge l"28_blankC<20968a>a> hhref="http://cvsuriniaom/csadvisories/21063/titge l"28_blankC<21063a>a> hhref="http://cvsuriniaom/csadvisories/21135/titge l"28_blankC<21135a>a> hhref="http://cvsuriniaom/csadvisories/21137/titge l"28_blankC<21137a>a> hhref="http://cvsuriniaom/csadvisories/21143/titge l"28_blankC<21143a>a> hhref="http://cvsuriniaom/csadvisories/21585/titge l"28_blankC<21585a>a> h/li>
  • /CIP VulDB s: hhref="http://cvw.scscip.ch/?vnedb.2336titge l"28_blankC<2336a>a> h/li>
  • VUPEN Advisory: hhref="http://cvw.scvupenom/csenglishsadvisories/2006/2450cltge l"28_blankCa> h/li>
  • VendorwSpecific Advisory URL: hhref="htf://cvckcches.sgiom/cscupport/freescurityfo/advisories/20060701-01-U.asccltge l"28_blankCa> hhref="http://cvsupport.avayaom/cselmodocs2scurityfo/ASA006-30167.htmcltge l"28_blankC hhref="http://cvw.scmdroiivaom/cscurityfo/advisories?name=MDKSA006-3:110cltge l"28_blankC hhref="http://cvw.scnovellom/cslinuxscurityfo/advisories/2006_38_curityfothtmlcltge l"28_blankC hhref="http:/s/cvissuas.rckchom/csbrowse/RPL-473cltge l"28_blankCa> h/li>
  • Mail List(Post: hhref="http://cvch -ives.neohapsisom/csah -ives/fulldisclosure/06-06-5/0772thtmlcltge l"28_blankCa> h/li>
  • Oi6arsAdvisory URL: hhref="http://cvsurlists.arg/lists/fulldisclosure/06-0/May/0774thtmlcltge l"28_blankC hhref="http://cvslackware.m/cscurityfo/viewer.php?l=slackware-surityFo&y=06-3&m=slackware-surityFo.4573 hhref="http://cvw.sctrustix.arg/errata/06-0/0042/titge l"28_blankC hhref="http://cvw.scubuntutm/csusnsusn-304-1titge l"28_blankC hhref="http://cvw.scustdebian.arg/curityfo/06-0/dsa-1107titge l"28_blankC hhref="http://cvw.scustdebian.arg/curityfo/06-0/dsa-1115titge l"28_blankCa> h/li>
  • RedHat RHSA: hhref="http://cvrhn.redhatom/cserrata/RHSA-06-06-571thtmlcltge l"28_blankCa> h/li> rable> 洞与者 order="0" wiign="center" cl="teinfonauthorc ="2CVUnknowngorwInmponle atd> el { { dth=": 80px; float:eleft; ften-weight:ebold; } order="0" wiign="center" cl="teinfons"c ="2CV el {>洞库称:el {>uPG (gParse_Ur I_ID Rote atBuff" 1Oge 4gth lnerabilitieytd> el {>BugtraqID:td>el {> el {>远程溢出:td>el {>Yesa>> el {>本地溢出:td>el {>No tab >el {>布时期:td>el {>06-06-6-20 12:00:00td> el {>更新期:td>el {>2007-03-19 11:04:00 tab ="2CVh>el {>洞与者:td>el {> 受影响的程序版本 order="0" wiign="center" cl="teinfonge 1c Ubuntu Ubuntu Linux 5.10/spch tbr/> Ubuntu Ubuntu Linux 5.10//powerpctbr/> Ubuntu Ubuntu Linux 5.10//i386tbr/> Ubuntu Ubuntu Linux 5.10//amd64tbr/> Ubuntu Ubuntu Linux 5.0 4/powerpctbr/> Ubuntu Ubuntu Linux 5.0 4/i386tbr/> Ubuntu Ubuntu Linux 5.0 4/amd64tbr/> Ubuntu Ubuntu Linux 6.06 LTS/spch tbr/> Ubuntu Ubuntu Linux 6.06 LTS/powerpctbr/> Ubuntu Ubuntu Linux 6.06 LTS/i386tbr/> Ubuntu Ubuntu Linux 6.06 LTS/amd64tbr/> Trustix /urite Linux 3.0itbr/> Trustix /urite Linux 2.2ntbr/> Trustix /urite Eer" prise Linux 2.0itbr/> SuSE SUSE Linux Eer" prise Serrsi 8tbr/> span> span> SuSE SUSE Linux Eer" prise Serrsi 10tbr/> SuSE SUSE Linux Eer" prise SDK 10tbr/> SuSE SUSE Linux Eer" prise Desktop 10tbr/> Slackware Linux 10.2itbr/> Slackware Linux 10.1itbr/> Slackware Linux 10.0itbr/> Slackware Linux 9.1itbr/> Slackware Linux 9.0itbr/> SGI /ro/ket 3.0i SP6tbr/> S.u.S.E. Uni0osLinux 1.0itbr/> S.u.S.E. SuSE Linux /tindarssSerrsi 8.0itbr/> S.u.S.E. SuSE Linux /choolsSerrsi forwi386.itbr/> S.u.S.E. SUSE LINUX Rotail Solu ns, 8.0itbr/> S.u.S.E. SuSE Linux OpenexnhangesSerrsi 4.0itbr/> S.u.S.E. SuSE Linux Open-Xnhanges4.1itbr/> S.u.S.E. Open-Eer" prise-Serrsi 9.0itbr/> S.u.S.E. Open-Eer" prise-Serrsi 1tbr/> S.u.S.E. Office Serrsi tbr/> S.u.S.E. Novell Linux Desktop 9.0itbr/> S.u.S.E. Novell Linux Desktop 1.0itbr/> S.u.S.E. Linux /rofesngonil 10.0i OSStbr/> S.u.S.E. Linux /rofesngonil 10.0itbr/> S.u.S.E. Linux /rofesngonil 9.3 x86_64tbr/> S.u.S.E. Linux /rofesngonil 9.3 tbr/> S.u.S.E. Linux /rofesngonil 9.2 x86_64tbr/> S.u.S.E. Linux /rofesngonil 9.2itbr/> S.u.S.E. Linux /rofesngonil 9.1 x86_64tbr/> S.u.S.E. Linux /rofesngonil 9.1itbr/> S.u.S.E. Linux /rofesngonil 10.1tbr/> S.u.S.E. Linux /ersonil 10.0i OSStbr/> S.u.S.E. Linux /ersonil 9.3 x86_64tbr/> S.u.S.E. Linux /ersonil 9.3 tbr/> S.u.S.E. Linux /ersonil 9.2 x86_64tbr/> S.u.S.E. Linux /ersonil 9.2 tbr/> S.u.S.E. Linux /ersonil 9.1 x86_64tbr/> S.u.S.E. Linux /ersonil 9.1 tbr/> S.u.S.E. Linux /ersonil 10.1tbr/> S.u.S.E. Linux OpenexnhangesSerrsi tbr/> S.u.S.E. Linux Office Serrsi tbr/> S.u.S.E. Linux Eer" prise Serrsi forwS/390.9.0itbr/> S.u.S.E. Linux Eer" prise Serrsi forwS/390.itbr/> S.u.S.E. Linux Eer" prise Serrsi 9tbr/> S.u.S.E. Linux Desktop 1.0itbr/> S.u.S.E. Linux Datase.d Serrsi 0tbr/> S.u.S.E. Linux ConnectivyFo Serrsi tbr/> rPath rPath Linux 1tbr/> RedHat Eer" prise Linux WS 4tbr/> RedHat Eer" prise Linux WS 3tbr/> RedHat Eer" prise Linux WS 2.1 IA64tbr/> RedHat Eer" prise Linux WS 2.1tbr/> RedHat Eer" prise Linux ES 4tbr/> RedHat Eer" prise Linux ES 3tbr/> RedHat Eer" prise Linux ES 2.1 IA64tbr/> RedHat Eer" prise Linux ES 2.1tbr/> RedHat Desktop 4.0itbr/> RedHat Desktop 3.0itbr/> RedHat Advanced-Worksgion.p uorwi6--Itinium /rocesnorw2.1 IA64tbr/> RedHat Advanced-Worksgion.p uorwi6--Itinium /rocesnorw2.1 tbr/> Red Hat Fedora Core6tbr/> Red Hat Fedora Core5tbr/> Red Hat Eer" prise Linux AS 4tbr/> Red Hat Eer" prise Linux AS 3tbr/> Red Hat Eer" prise Linux AS 2.1 IA64tbr/> Red Hat Eer" prise Linux AS 2.1tbr/> OpenPKG OpenPKG 2.5 tbr/> OpenPKG OpenPKG 2.2 tbr/> OpenPKG OpenPKG Currenttbr/> Mdroiiva Linux Mdroiake 06-0.0 x86_64tbr/> Mdroiiva Linux Mdroiake 06-0.0 tbr/> Mdroiiva Linux Mdroiake 10.2ix86_64tbr/> Mdroiiva Linux Mdroiake 10.2itbr/> MdroiakeSoft Multi Network Firewlll 2.0itbr/> MdroiakeSoft Corporate Serrsi 3.0 x86_64tbr/> MdroiakeSoft Corporate Serrsi 3.0 tbr/> GNU GNU /rivacy Guarss9.20, tbr/> GNU GNU /rivacy Guarss9.2015 tbr/> GNU GNU /rivacy Guarss9.4.3 tbr/> Debian Linux 3.1i/spch tbr/> Debian Linux 3.1i/s/390tbr/> Debian Linux 3.1i/ppctbr/> Debian Linux 3.1i/mipseltbr/> Debian Linux 3.1i/mipstbr/> Debian Linux 3.1i/m68ktbr/> Debian Linux 3.1i/ia-64tbr/> Debian Linux 3.1i/ia-32tbr/> Debian Linux 3.1i/hppatbr/> Debian Linux 3.1i/armtbr/> Debian Linux 3.1i/amd64tbr/> Debian Linux 3.1i/alphatbr/> Debian Linux 3.1itbr/> Debian Linux 3.0i/spch tbr/> Debian Linux 3.0i/s/390tbr/> Debian Linux 3.0i/ppctbr/> Debian Linux 3.0i/mipseltbr/> Debian Linux 3.0i/mipstbr/> Debian Linux 3.0i/m68ktbr/> Debian Linux 3.0i/ia-64tbr/> Debian Linux 3.0i/ia-32tbr/> Debian Linux 3.0i/hppatbr/> Debian Linux 3.0i/armtbr/> Debian Linux 3.0i/alphatbr/> Debian Linux 3. tbr/> Avaya S8710//R2.0.1tbr/> Avaya S8710//R2.0.0tbr/> Avaya S8700//R2.0.1tbr/> Avaya S8700//R2.0.0tbr/> Avaya S8500//R2.0.1tbr/> Avaya S8500//R2.0.0tbr/> Avaya S8300//R2.0.1tbr/> Avaya S8300//R2.0.0tbr/> Avaya Msage g) wormagesSerrsi tbr/> Avaya Msage e Networkg) w tbr/> Avaya IntuyFo LXtbr/> Avaya Conrsiged Communicion.pssSerrsi 2.0itbr/> GNU GNU /rivacy Guarss9.4.4itbr/>td> 不受影响的程序版本 order="0" wiign="center" cl="teinfonge 2c GNU GNU /rivacy Guarss9.4.4itbr/>td> 洞讨论 order="0" wiign="center" cl="teinfondiscussc GPG (gis pronei caawmote atbuff" -Qge 4gthavnerabilitiey beuse a it fails- capropwr ovbounds-checkv2n I-supplied input beuoreontpyg) wiri ca cl=ncufficlter ovsized mory vibuff" .tbr/>tbr/>This issua mayeaows mote attackers s- caexuri attrbitrary machine node " ai6-ontenex" sei6a aff"ctedwapplicion.p,ibutei6is has nosrbeep ntefi">ad.tbr/>tbr/>uPG (gvsions, 4.3 and po9.20, are vnerabillei cai6is issua;aprevious vsions, mayeaosolbe aff"cted.td> 洞利用 order="0" wiign="center" cl="teinfonexploitc T6--foows g) wPwr .mpomdro dotenstrates i6is issuasby ush) g) wi6a aff"ctedwapplicion.p:tbr/>tbr/>pwr -e 'print "\xcd\xff\xff\xff\xff\xfe"'| /var/gnupg/bba/gpg --no-armortbr/>tbr/>Current ovwe are nosraware seanyeexploits uorwi6is issua./If you feelvwe are " aerrorgorwif you are aware semoreorenterainformion.p,iaieaseomail us at:evnedb@surityfofocusom/c. hul> 解决方案 order="0" wiign="center" cl="teinfonsolu ns,c The rsndorwhas released vsions,s9.4.4i seGNU (g ca ddrsag this issua.tbr/> tbr/> Pieaseoseeii6a r="erenced advisories forwinformion.p oclobnn" g=" cdwapplyg) wfixes.tbr/>tbr/> w tbr/> GNU GNU /rivacy Guarss9.2015 tbr/> hul>
  • Debian gnupg-e ent_9.2015-6sge l1_alphatdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_alphatdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_amd64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_amd64cdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_armcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_armcdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_hppacdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_hppacdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_i386cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_i386cdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_ia64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_ia64cdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_m68kcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_m68kcdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_mipscdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_mipscdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_mipselcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_mipselcdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_powerpccdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_powerpccdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_s390cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_s390cdebCtbr/>
  • Debian gnupg-e ent_9.2015-6sge l1_spch cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg-e ent_9.2015-6sge l1_spch cdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_alphatdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_alphatdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_amd64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_amd64cdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_armcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_armcdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_hppacdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_hppacdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_i386cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_i386cdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_ia64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_ia64cdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_m68kcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_m68kcdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_mipscdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_mipscdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_mipselcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_mipselcdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_powerpccdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_powerpccdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_s390cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_s390cdebCtbr/>
  • Debian gnupg2_9.2015-6sge l1_spch cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gnupg2_9.2015-6sge l1_spch cdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_alphatdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_alphatdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_amd64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_amd64cdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_armcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_armcdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_hppacdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_hppacdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_i386cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_i386cdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_ia64cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_ia64cdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_m68kcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_m68kcdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_mipscdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_mipscdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_mipselcdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_mipselcdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_powerpccdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_powerpccdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_s390cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_s390cdebCtbr/>
  • Debian gpgsm_9.2015-6sge l1_spch cdebtbr/> Debian GNU/Linux 3.1iignas sge ltbr/> hhref="http://cvsurityfotdebian.arg/plti/2pdates/inba/g/gnupg2/gpgsm_9.2015-6sge l1_spch cdebCtbr/> table> 相关参考 order="0" wiign="center" cl="teinfonf="c ="2CV hul>
  • hhref="http://cvsupport.avayaom/cselmodocs2scurityfo/ASA006-30167.htmc>ASA006-30167 - gnupg/surityfos2pdate (RHSA-06-06-571)a>a> (Avaya)tbr/>tdli>
  • hhref="http://cvw.scgnupg.arg">uPG (gHomepagea>a> (uPG ()tbr/>tdli>
  • hhref="http://cvcvscgnupg.arg/cgi-bba/viewcvsccgir> unk/g10/parse-cketst.c">uPG (: > unk/g10/parse-cketst.ca>a> (uNU)tbr/>tdli>
  • hhref="http://cvrhn.redhatom/cserrata/RHSA-06-06-571thtmlca> (RedHat)tbr/>tdli>
  • hhref="htsah -ive/1/438751">rPSA-06-06-120-1 gnupga>a> (Justin M. Forbes)tbr/>tdli> hiv> civ> hiv> ype="="text/javascpt> c cing0" w a>a> a>a> a>a> a>a> a>a> a>a> a>an> a>a> ype="="text/javascpt> cl="tebdshare_js" data="te="=tltis&u="t5376177" > ype="="text/javascpt> cl="tebdshell_js"> ype="="text/javascpt> c var bds_ntefig = {'bdText':'E-2006-3082