Ok, here's the .dsc and .diff.gz for etch:
Format: 1.0
Source: python-crypto
Version: 2.0.1+dfsg1-1.2+etch0
Binary: python-crypto
Maintainer: Andreas Rottmann
Architecture: any
Standards-Version: 3.7.2
Build-Depends: cdbs (>= 0.4.41), debhelper (>= 5.0.37.1), python-central (>=
0.4.17), python-a
On Mon, Feb 23, 2009 at 03:53:56PM +0100, Andreas Rottmann wrote:
>
> I've built a package for lenny now, a package for etch will follow
> soon. As this is my first time to prepare a security-fix package, I'm
> not exactly sure if I've done everything according to the rules. .dsc
> and .diff.gz at
I've built a package for lenny now, a package for etch will follow
soon. As this is my first time to prepare a security-fix package, I'm
not exactly sure if I've done everything according to the rules. .dsc
and .diff.gz attached.
Format: 1.0
Source: python-crypto
Binary: python-crypto, python-cry
Moritz Muehlenhoff writes:
> Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote
> attackers to cause a denial of service and possibly execute arbitrary
> code via a large ARC2 key length.
> ---
>
> Can you prepare updated packages for oldstable-security and stable-security?
>
I'll tr
Package: python-crypto
Severity: grave
Tags: security
--
Name: CVE-2009-0544
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544
Reference: MLIST:[oss-security] 20090207 CVE Request: pycrypto
Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/07/1
Refe
5 matches
Mail list logo