bully 1.4.00-2ubuntu3 source package in Ubuntu
Changelog
bully (1.4.00-2ubuntu3) noble; urgency=medium * No-change rebuild for CVE-2024-3094 -- William Grant <email address hidden> Mon, 01 Apr 2024 16:40:33 +1100
Upload details
- Uploaded by:
- William Grant
- Uploaded to:
- Noble
- Original maintainer:
- Ubuntu Developers
- Architectures:
- any
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | misc | |
Noble | release | universe | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
bully_1.4.00.orig.tar.gz | 387.1 KiB | 7da8f588caed1cbcce70e5ecf4b90588a2647ee0f7582ba05e88ced3e245d539 |
bully_1.4.00-2ubuntu3.debian.tar.xz | 4.0 KiB | 4739ff1743246795d917fbc738e02a47178b6d41f3323b398f9e7ce7df2b4dbb |
bully_1.4.00-2ubuntu3.dsc | 2.0 KiB | b2e74d5810836eeca45a6cc3c615c5aa28e5093c23473a32fcc22583d2e26384 |
Available diffs
- diff from 1.4.00-2ubuntu1 to 1.4.00-2ubuntu3 (419 bytes)
- diff from 1.4.00-2ubuntu2 to 1.4.00-2ubuntu3 (315 bytes)
Binary packages built by this source
- bully: Implementation of the WPS brute force attack, written in C
Bully is a new implementation of the WPS brute force attack, written in C. It
is conceptually identical to other programs, in that it exploits the (now well
known) design flaw in the WPS specification. It has several advantages over
the original reaver code. These include fewer dependencies, improved memory
and cpu performance, correct handling of endianness, and a more robust set of
options.
- bully-dbgsym: debug symbols for bully