-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 23 Feb 2009 20:12:05 +0100 Source: python-crypto Binary: python-crypto Architecture: source i386 Version: 2.0.1+dfsg1-1.2+etch0 Distribution: oldstable-security Urgency: high Maintainer: Andreas Rottmann <rotty@debian.org> Changed-By: Andreas Rottmann <rotty@debian.org> Description: python-crypto - cryptographic algorithms and protocols for Python Changes: python-crypto (2.0.1+dfsg1-1.2+etch0) oldstable-security; urgency=high . * Apply fix for CVE-2009-0544 (Buffer overflow in the ARC2 module), and a stand-alone version of the associated testcase (see http://www.openwall.com/lists/oss-security/2009/02/07/1). Files: 6cd41eabcc338d436543116b0692e222 775 python optional python-crypto_2.0.1+dfsg1-1.2+etch0.dsc 2167bc15746577af9182e0965ff4b6b0 10101 python optional python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz 7f6bf20b8543354a2a232e32db0ef651 157032 python optional python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJJrultAAoJEL97/wQC1SS+tqIIAKIW4OuKUk6pY7ApG30feX5K BzP3plvH4NZrx7jb82RtAskaQgyD8ECwtUiekDsSVr7TBt2sJz6L206SiEo08eTR sO9dessauEivG06F+1RPw55tNYitcuFHL/Zkpu6zAhm5QQfxgH1NuRm2eQybNhBY yKlVNBs9lAYSQO6YQy3yF+vVye0IgkdtfNLMQ3W10n6rV6p2+wxmJwi7Py0BVSg3 LHwxtfsGuFbfrooKwRHXyIjuc5sB6MjoOAL7EsNbJpsx1helqrKDeRJmS0vVqcT7 4vWJF+1cArpo2/bk4BgcDX3pkZQ70fjUHNZSVaGwAkq1J3gQql4NEqXQIO/O6/c= =UXeX -----END PGP SIGNATURE----- Accepted: python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0.diff.gz python-crypto_2.0.1+dfsg1-1.2+etch0.dsc to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0.dsc python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb to pool/main/p/python-crypto/python-crypto_2.0.1+dfsg1-1.2+etch0_i386.deb