Debian Bug report logs -
#414382
[INTL:ja] Japanese po-debconf template translation
Reported by: TANAKA Atushi <atanaka@hotcake.halfmoon.jp>
Date: Sun, 11 Mar 2007 13:25:57 UTC
Severity: minor
Tags: l10n, patch, pending
Found in version 1.4.4-7
Fixed in versions krb5/1.4.4-8, krb5/1.4.4-7etch1
Done: Sam Hartman <hartmans@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#414382; Package krb5.
(full text, mbox, link).
Acknowledgement sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
New Bug report received and forwarded. Copy sent to Sam Hartman <hartmans@debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: krb5
Version: 1.4.4-7
Severity: minor
Tags: l10n patch
Hello
Please find attached Japanese debconf templates translation,
proofread by Japanese debian developpers and users.
This file should be put as debian/po/ja.po in your package build
tree.
Sincerely
TANAKA, Atushi
[ja.po.gz (application/octet-stream, attachment)]
Tags added: pending
Request was from hartmans@mit.edu
to control@bugs.debian.org.
(full text, mbox, link).
Reply sent to Sam Hartman <hartmans@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #12 received at 414382-close@bugs.debian.org (full text, mbox, reply):
Source: krb5
Source-Version: 1.4.4-8
We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive:
krb5-admin-server_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-admin-server_1.4.4-8_i386.deb
krb5-clients_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-clients_1.4.4-8_i386.deb
krb5-doc_1.4.4-8_all.deb
to pool/main/k/krb5/krb5-doc_1.4.4-8_all.deb
krb5-ftpd_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-ftpd_1.4.4-8_i386.deb
krb5-kdc_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-kdc_1.4.4-8_i386.deb
krb5-rsh-server_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-rsh-server_1.4.4-8_i386.deb
krb5-telnetd_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-telnetd_1.4.4-8_i386.deb
krb5-user_1.4.4-8_i386.deb
to pool/main/k/krb5/krb5-user_1.4.4-8_i386.deb
krb5_1.4.4-8.diff.gz
to pool/main/k/krb5/krb5_1.4.4-8.diff.gz
krb5_1.4.4-8.dsc
to pool/main/k/krb5/krb5_1.4.4-8.dsc
libkadm55_1.4.4-8_i386.deb
to pool/main/k/krb5/libkadm55_1.4.4-8_i386.deb
libkrb5-dbg_1.4.4-8_i386.deb
to pool/main/k/krb5/libkrb5-dbg_1.4.4-8_i386.deb
libkrb5-dev_1.4.4-8_i386.deb
to pool/main/k/krb5/libkrb5-dev_1.4.4-8_i386.deb
libkrb53_1.4.4-8_i386.deb
to pool/main/k/krb5/libkrb53_1.4.4-8_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 414382@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sam Hartman <hartmans@debian.org> (supplier of updated krb5 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 11 Mar 2007 19:08:52 -0400
Source: krb5
Binary: krb5-doc libkrb5-dev krb5-rsh-server krb5-user krb5-ftpd libkadm55 libkrb53 krb5-clients krb5-telnetd krb5-kdc krb5-admin-server libkrb5-dbg
Architecture: source i386 all
Version: 1.4.4-8
Distribution: unstable
Urgency: emergency
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Sam Hartman <hartmans@debian.org>
Description:
krb5-admin-server - MIT Kerberos master server (kadmind)
krb5-clients - Secure replacements for ftp, telnet and rsh using MIT Kerberos
krb5-doc - Documentation for MIT Kerberos
krb5-ftpd - Secure FTP server supporting MIT Kerberos
krb5-kdc - MIT Kerberos key server (KDC)
krb5-rsh-server - Secure replacements for rshd and rlogind using MIT Kerberos
krb5-telnetd - Secure telnet server supporting MIT Kerberos
krb5-user - Basic programs to authenticate using MIT Kerberos
libkadm55 - MIT Kerberos administration runtime libraries
libkrb5-dbg - Debugging files for MIT Kerberos
libkrb5-dev - Headers and development libraries for MIT Kerberos
libkrb53 - MIT Kerberos runtime libraries
Closes: 414382
Changes:
krb5 (1.4.4-8) unstable; urgency=emergency
.
* MIT-SA-2007-1: telnet allows login as an arbitrary user when
presented with a specially crafted username; CVE-2007-0956
* krb5_klog_syslog has a trivial buffer overflow that can be exploited
by network data; CVE-2007-0957. The upstream patch is very intrusive
because it fixes each call to syslog to have proper length checking as
well as the actual krb5_klog_syslog internals to use vsnprintf rather
than vsprintf. I have chosen to only include the change to
krb5_klog_syslog for sarge. This is sufficient to fix the problem but
is much smaller and less intrusive. (MIT-SA-2007-2)
* MIT-SA-2007-3: The GSS-API library can cause a double free if
applications treat certain errors decoding a message as errors that
require freeing the output buffer. At least the gssapi rpc library
does this, so kadmind is vulnerable. Fix the gssapi library because
the spec allows applications to treat errors this way. CVE-2007-1216
* New Japanese translation, thanks TANAKA Atushi, Closes: #414382
Files:
b1cfae2eab8636ee3a2f532e5b57b38b 866 net standard krb5_1.4.4-8.dsc
a9753b63f09b1a614a3ff2abcbd99401 1585233 net standard krb5_1.4.4-8.diff.gz
c546a01412cc97542779ed4ef0542f97 1811718 doc optional krb5-doc_1.4.4-8_all.deb
764b770fdf72d7af9f8ebf78d89f0c54 173598 libs optional libkadm55_1.4.4-8_i386.deb
d1770cf7f368a3d5268fe7b52c8fc6f0 407936 libs standard libkrb53_1.4.4-8_i386.deb
ddfadb4b430b0229f0ac5db253533079 123774 net optional krb5-user_1.4.4-8_i386.deb
3b24088c4ba0624c98ef1fd10f981d05 196070 net optional krb5-clients_1.4.4-8_i386.deb
9d0d43f3963e1534525a3180fe59df1f 79858 net optional krb5-rsh-server_1.4.4-8_i386.deb
79a0ad56e3c34965087b374e2d2076f0 57796 net extra krb5-ftpd_1.4.4-8_i386.deb
a5a470ce065ede329c8554ac3db96cee 61986 net extra krb5-telnetd_1.4.4-8_i386.deb
cdc6d97a0e17f0bbfa7be867de4675aa 132802 net optional krb5-kdc_1.4.4-8_i386.deb
58bcde41c0cdd90672374b648e8b071d 78002 net optional krb5-admin-server_1.4.4-8_i386.deb
62210af6feda85a0e2e12befada41f3a 679664 libdevel extra libkrb5-dev_1.4.4-8_i386.deb
d4ab5b4b2f85b61c6cea0d879b0a73b9 1037432 libdevel extra libkrb5-dbg_1.4.4-8_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGEqFw/I12czyGJg8RAlMCAJoCrAwDC0+yxShqSVOqW3ZoabJrfwCg63DE
No481i4X7BFEX6T40Sz+EFk=
=Y05B
-----END PGP SIGNATURE-----
Reply sent to Sam Hartman <hartmans@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #17 received at 414382-close@bugs.debian.org (full text, mbox, reply):
Source: krb5
Source-Version: 1.4.4-7etch1
We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive:
krb5-admin-server_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-admin-server_1.4.4-7etch1_i386.deb
krb5-clients_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-clients_1.4.4-7etch1_i386.deb
krb5-doc_1.4.4-7etch1_all.deb
to pool/main/k/krb5/krb5-doc_1.4.4-7etch1_all.deb
krb5-ftpd_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-ftpd_1.4.4-7etch1_i386.deb
krb5-kdc_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-kdc_1.4.4-7etch1_i386.deb
krb5-rsh-server_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_i386.deb
krb5-telnetd_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-telnetd_1.4.4-7etch1_i386.deb
krb5-user_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/krb5-user_1.4.4-7etch1_i386.deb
krb5_1.4.4-7etch1.diff.gz
to pool/main/k/krb5/krb5_1.4.4-7etch1.diff.gz
krb5_1.4.4-7etch1.dsc
to pool/main/k/krb5/krb5_1.4.4-7etch1.dsc
libkadm55_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/libkadm55_1.4.4-7etch1_i386.deb
libkrb5-dbg_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_i386.deb
libkrb5-dev_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/libkrb5-dev_1.4.4-7etch1_i386.deb
libkrb53_1.4.4-7etch1_i386.deb
to pool/main/k/krb5/libkrb53_1.4.4-7etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 414382@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sam Hartman <hartmans@debian.org> (supplier of updated krb5 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 11 Mar 2007 19:08:52 -0400
Source: krb5
Binary: krb5-doc libkrb5-dev krb5-rsh-server krb5-user krb5-ftpd libkadm55 libkrb53 krb5-clients krb5-telnetd krb5-kdc krb5-admin-server libkrb5-dbg
Architecture: source i386 all
Version: 1.4.4-7etch1
Distribution: testing-security
Urgency: emergency
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Sam Hartman <hartmans@debian.org>
Description:
krb5-admin-server - MIT Kerberos master server (kadmind)
krb5-clients - Secure replacements for ftp, telnet and rsh using MIT Kerberos
krb5-doc - Documentation for MIT Kerberos
krb5-ftpd - Secure FTP server supporting MIT Kerberos
krb5-kdc - MIT Kerberos key server (KDC)
krb5-rsh-server - Secure replacements for rshd and rlogind using MIT Kerberos
krb5-telnetd - Secure telnet server supporting MIT Kerberos
krb5-user - Basic programs to authenticate using MIT Kerberos
libkadm55 - MIT Kerberos administration runtime libraries
libkrb5-dbg - Debugging files for MIT Kerberos
libkrb5-dev - Headers and development libraries for MIT Kerberos
libkrb53 - MIT Kerberos runtime libraries
Closes: 414382
Changes:
krb5 (1.4.4-7etch1) testing-security; urgency=emergency
.
* MIT-SA-2007-1: telnet allows login as an arbitrary user when
presented with a specially crafted username; CVE-2007-0956
* krb5_klog_syslog has a trivial buffer overflow that can be exploited
by network data; CVE-2007-0957. The upstream patch is very intrusive
because it fixes each call to syslog to have proper length checking as
well as the actual krb5_klog_syslog internals to use vsnprintf rather
than vsprintf. I have chosen to only include the change to
krb5_klog_syslog for sarge. This is sufficient to fix the problem but
is much smaller and less intrusive. (MIT-SA-2007-2)
* MIT-SA-2007-3: The GSS-API library can cause a double free if
applications treat certain errors decoding a message as errors that
require freeing the output buffer. At least the gssapi rpc library
does this, so kadmind is vulnerable. Fix the gssapi library because
the spec allows applications to treat errors this way. CVE-2007-1216
* New Japanese translation, thanks TANAKA Atushi, Closes: #414382
Files:
3c812c5bbd93a01103c67c50a15646be 876 net standard krb5_1.4.4-7etch1.dsc
a675e5953bb8a29b5c6eb6f4ab0bb32a 11017910 net standard krb5_1.4.4.orig.tar.gz
993d66c078ac0a5f6e29155c6973ee0a 1585246 net standard krb5_1.4.4-7etch1.diff.gz
4b98ff8f04581e869209f96768c26ef5 1811728 doc optional krb5-doc_1.4.4-7etch1_all.deb
a2f67bd332d2bc90732536606fb5af89 173608 libs optional libkadm55_1.4.4-7etch1_i386.deb
6173bc1bb4e1ca40b911036ec34488c3 407958 libs standard libkrb53_1.4.4-7etch1_i386.deb
2c0f795975289fdfc4254852ac5fe1c5 123794 net optional krb5-user_1.4.4-7etch1_i386.deb
40cc5fc641d24fb1cb54d3aba24e51b0 196088 net optional krb5-clients_1.4.4-7etch1_i386.deb
5bda94c68e5368047ed93665c734ec80 79888 net optional krb5-rsh-server_1.4.4-7etch1_i386.deb
20aabab63e0976d38f0a72e9fa1f42d2 57822 net extra krb5-ftpd_1.4.4-7etch1_i386.deb
17c4607112e571b22f95aa174502998c 62008 net extra krb5-telnetd_1.4.4-7etch1_i386.deb
cef966062845545c71f5a6f84e6fdfc4 132828 net optional krb5-kdc_1.4.4-7etch1_i386.deb
076140c9d3df111148f259a0c1aa2d34 78004 net optional krb5-admin-server_1.4.4-7etch1_i386.deb
24d0bb8fea2a924b395126204448ea34 679676 libdevel extra libkrb5-dev_1.4.4-7etch1_i386.deb
35fc79a9574582d3dc70e2e582300fce 1037458 libdevel extra libkrb5-dbg_1.4.4-7etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFF/4wy/I12czyGJg8RAr9PAJ9qupHKwukUlwj5O/Js+e0e+bcaYgCgmvOA
oAnoTDkaJk9FViLqkuP/Y2c=
=Bsf2
-----END PGP SIGNATURE-----
Tags added: pending
Request was from hartmans@mit.edu
to control@bugs.debian.org.
(Sun, 22 Apr 2007 10:48:06 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Tue, 26 Jun 2007 19:56:26 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Mon Jun 5 02:24:50 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.