[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted python-crypto 2.0.1+dfsg1-1.2+etch0 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 23 Feb 2009 20:12:05 +0100
Source: python-crypto
Binary: python-crypto
Architecture: source i386
Version: 2.0.1+dfsg1-1.2+etch0
Distribution: oldstable-security
Urgency: high
Maintainer: Andreas Rottmann <rotty@debian.org>
Changed-By: Andreas Rottmann <rotty@debian.org>
Description: 
 python-crypto - cryptographic algorithms and protocols for Python
Changes: 
 python-crypto (2.0.1+dfsg1-1.2+etch0) oldstable-security; urgency=high
 .
   * Apply fix for CVE-2009-0544 (Buffer overflow in the ARC2 module), and
     a stand-alone version of the associated testcase (see
     http://www.openwall.com/lists/oss-security/2009/02/07/1).
Files: 
 6cd41eabcc338d436543116b0692e222 775 python optional python-crypto_2.0.1+dfsg1-1.2+etch0.dsc
 2167bc15746577af9182e0965ff4b6b0 10101 python optional python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz
 7f6bf20b8543354a2a232e32db0ef651 157032 python optional python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJrultAAoJEL97/wQC1SS+tqIIAKIW4OuKUk6pY7ApG30feX5K
BzP3plvH4NZrx7jb82RtAskaQgyD8ECwtUiekDsSVr7TBt2sJz6L206SiEo08eTR
sO9dessauEivG06F+1RPw55tNYitcuFHL/Zkpu6zAhm5QQfxgH1NuRm2eQybNhBY
yKlVNBs9lAYSQO6YQy3yF+vVye0IgkdtfNLMQ3W10n6rV6p2+wxmJwi7Py0BVSg3
LHwxtfsGuFbfrooKwRHXyIjuc5sB6MjoOAL7EsNbJpsx1helqrKDeRJmS0vVqcT7
4vWJF+1cArpo2/bk4BgcDX3pkZQ70fjUHNZSVaGwAkq1J3gQql4NEqXQIO/O6/c=
=UXeX
-----END PGP SIGNATURE-----


Accepted:
python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz
  to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz
python-crypto_2.0.1+dfsg1-1.2+etch0.dsc
  to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0.dsc
python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb
  to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb


Reply to: