Bug#516660: Buffer overflow in the PyCrypto ARC2 modules

2009-02-23 Thread Andreas Rottmann
Ok, here's the .dsc and .diff.gz for etch: Format: 1.0 Source: python-crypto Version: 2.0.1+dfsg1-1.2+etch0 Binary: python-crypto Maintainer: Andreas Rottmann Architecture: any Standards-Version: 3.7.2 Build-Depends: cdbs (>= 0.4.41), debhelper (>= 5.0.37.1), python-central (>= 0.4.17), python-a

Bug#516660: Buffer overflow in the PyCrypto ARC2 modules

2009-02-23 Thread Moritz Muehlenhoff
On Mon, Feb 23, 2009 at 03:53:56PM +0100, Andreas Rottmann wrote: > > I've built a package for lenny now, a package for etch will follow > soon. As this is my first time to prepare a security-fix package, I'm > not exactly sure if I've done everything according to the rules. .dsc > and .diff.gz at

Bug#516660: Buffer overflow in the PyCrypto ARC2 modules

2009-02-23 Thread Andreas Rottmann
I've built a package for lenny now, a package for etch will follow soon. As this is my first time to prepare a security-fix package, I'm not exactly sure if I've done everything according to the rules. .dsc and .diff.gz attached. Format: 1.0 Source: python-crypto Binary: python-crypto, python-cry

Bug#516660: Buffer overflow in the PyCrypto ARC2 modules

2009-02-22 Thread Andreas Rottmann
Moritz Muehlenhoff writes: > Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote > attackers to cause a denial of service and possibly execute arbitrary > code via a large ARC2 key length. > --- > > Can you prepare updated packages for oldstable-security and stable-security? > I'll tr

Bug#516660: Buffer overflow in the PyCrypto ARC2 modules

2009-02-22 Thread Moritz Muehlenhoff
Package: python-crypto Severity: grave Tags: security -- Name: CVE-2009-0544 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544 Reference: MLIST:[oss-security] 20090207 CVE Request: pycrypto Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/07/1 Refe