bully 1.4.00-2ubuntu3 source package in Ubuntu

Changelog

bully (1.4.00-2ubuntu3) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- William Grant <email address hidden>  Mon, 01 Apr 2024 16:40:33 +1100

Upload details

Uploaded by:
William Grant
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe misc
Noble release universe misc

Downloads

File Size SHA-256 Checksum
bully_1.4.00.orig.tar.gz 387.1 KiB 7da8f588caed1cbcce70e5ecf4b90588a2647ee0f7582ba05e88ced3e245d539
bully_1.4.00-2ubuntu3.debian.tar.xz 4.0 KiB 4739ff1743246795d917fbc738e02a47178b6d41f3323b398f9e7ce7df2b4dbb
bully_1.4.00-2ubuntu3.dsc 2.0 KiB b2e74d5810836eeca45a6cc3c615c5aa28e5093c23473a32fcc22583d2e26384

View changes file

Binary packages built by this source

bully: Implementation of the WPS brute force attack, written in C

 Bully is a new implementation of the WPS brute force attack, written in C. It
 is conceptually identical to other programs, in that it exploits the (now well
 known) design flaw in the WPS specification. It has several advantages over
 the original reaver code. These include fewer dependencies, improved memory
 and cpu performance, correct handling of endianness, and a more robust set of
 options.

bully-dbgsym: debug symbols for bully