[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#969429: marked as done (ITP: bully -- Implementation of the WPS brute force attack, written in C)



Your message dated Fri, 16 Oct 2020 23:00:14 +0000
with message-id <E1kTYhq-000HNc-I8@fasolo.debian.org>
and subject line Bug#969429: fixed in bully 1.4.00-1
has caused the Debian Bug report #969429,
regarding ITP: bully -- Implementation of the WPS brute force attack,  written in C
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
969429: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969429
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Owner: Karthik <kskarthik@disroot.org>
Severity: wishlist

* Package name : bully
Version : 1.4.00
Upstream Author : kimocoder <christian@aircrack-ng.org>
* URL : https://github.com/kimocoder/bully
* License : GPLv3
Programming Lang: C
Description : Implementation of the WPS brute force attack, written in C

--------
Regards,

Karthik
https://kskarthik.gitlab.io

--- End Message ---
--- Begin Message ---
Source: bully
Source-Version: 1.4.00-1
Done: Karthik <kskarthik@disroot.org>

We believe that the bug you reported is fixed in the latest version of
bully, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 969429@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Karthik <kskarthik@disroot.org> (supplier of updated bully package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA384

Format: 1.8
Date: Wed, 02 Sep 2020 17:37:51 +0530
Source: bully
Binary: bully bully-dbgsym
Architecture: source amd64
Version: 1.4.00-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Changed-By: Karthik <kskarthik@disroot.org>
Description:
 bully      - Implementation of the WPS brute force attack, written in C
Closes: 969429
Changes:
 bully (1.4.00-1) unstable; urgency=medium
 .
   * Initial release (Closes: #969429)
   * Changes for debian build system
Checksums-Sha1:
 0a81c8c249113db9cc17c76d1dad4116b51ca37f 1926 bully_1.4.00-1.dsc
 fdc5263bc5d1e5178179727dc4bd07e58d11b260 396422 bully_1.4.00.orig.tar.gz
 a937a5ebbb1794be88eadf0de4643d21416a3c4f 3572 bully_1.4.00-1.debian.tar.xz
 1289c2d058daad1c5b42b34d897ae30b109135ec 247160 bully-dbgsym_1.4.00-1_amd64.deb
 5798ff9ac7f3f0919b0da23feb052741e16d7902 5922 bully_1.4.00-1_amd64.buildinfo
 eedc535d451184911148b39fc68fdc1e71916c5e 71600 bully_1.4.00-1_amd64.deb
Checksums-Sha256:
 b20d4387379e1bfd2b48e937ef2aea713ba4e68d3c0a460b14bb16c82425efbb 1926 bully_1.4.00-1.dsc
 7da8f588caed1cbcce70e5ecf4b90588a2647ee0f7582ba05e88ced3e245d539 396422 bully_1.4.00.orig.tar.gz
 08cfb7e6304304f908f087e7f80645ba0163dca39b8a9a6f18c5e1cd0c9d2f8d 3572 bully_1.4.00-1.debian.tar.xz
 7fa13307fef1af176a071533f449a6eb92c1af2b1490ce5907a1d08608061764 247160 bully-dbgsym_1.4.00-1_amd64.deb
 4199db9e0c75334a6f2a7ea55a8d58af01be92eaf2c6c8d8049390485531e083 5922 bully_1.4.00-1_amd64.buildinfo
 bdc02ddfab15147c1aa3cf0f10dee9a02b2774bfafb1c1f04e556bd395d5617c 71600 bully_1.4.00-1_amd64.deb
Files:
 b86e8ed5274711d169eb9111cca79c47 1926 net optional bully_1.4.00-1.dsc
 affab7974d16a913e8eacbfb84392319 396422 net optional bully_1.4.00.orig.tar.gz
 2e011120c4383cbc835f65e1f49b5cf5 3572 net optional bully_1.4.00-1.debian.tar.xz
 83aade54b2dd949ef9b1fcad339a2e14 247160 debug optional bully-dbgsym_1.4.00-1_amd64.deb
 8a32280768ab688523d4fb278a85cc58 5922 net optional bully_1.4.00-1_amd64.buildinfo
 0492b20a631961fc39bf1b5aad8af422 71600 net optional bully_1.4.00-1_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCQAdFiEEjbPlhoZdK0orGFpcUAHhsJqjdEsFAl9hRiIACgkQUAHhsJqj
dEufyxAA9PEq14tiT1EYVs7QYQMJAGOcw+hxOOHPIFTTlY1F+vymFhQdqYNC7DcB
PZMxQZhcs4aKMNWRrHFLJdluTRVyLN2+N3f9EEMtNNfDHVFIJ4EEke3tVbQsH2fp
Vh1SbS9mTvYV5QgnEae+bkEJ00dztxgAaOLS7s7Hkv+c+FaUiyBMlaA5jNo1xlaZ
RVyr46+bE+k2qjx9e0wjR/fW++eGGVGXI1KQBuSbJ97EQwTH11b7WkTWI2qQbWpj
WeMEnnAEM3VQD91lMpCB2MEe83d4kp0Kmi6zfTdX2kZTcMXxkGroDiFEUCg7580w
nR8e9ZAikn1gY2EL2Mn+QE/CsuFqauRH96WV30QdMDv7IxOooactXLe7yCQGq7Ef
1llyE0CMVEypbGjFfF2w63rdabyoLkKEHUh+iWd7Ui9BExPIsJXjGoPrHsK5vIuG
/XYPm1ffezz52KWIWhUPsy+a42mSxQZnhvzRPSQkji8iXnkDogggWsWq7JB3Kkgf
FH4YvE5snWIaEL5X19pzYnroR80Wv1VtLvfJLU0vH6uP2PfCPkMdyzI7A3eGMr3d
KH2eyeRN1i71LqpEo9yONah0Db8jGRGVMFz5Nr9wz66yxfEuaW2JbFREOECAcErC
K/7J4N/+/U7fTD1vhaMMEh+Qdmx6SW1eVkxcn9tz6gy2ZvWIGNU=
=JbQR
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: