Debian Bug report logs - #414382
[INTL:ja] Japanese po-debconf template translation

version graph

Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debian.org>;

Reported by: TANAKA Atushi <atanaka@hotcake.halfmoon.jp>

Date: Sun, 11 Mar 2007 13:25:57 UTC

Severity: minor

Tags: l10n, patch, pending

Found in version 1.4.4-7

Fixed in versions krb5/1.4.4-8, krb5/1.4.4-7etch1

Done: Sam Hartman <hartmans@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#414382; Package krb5. (full text, mbox, link).


Acknowledgement sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
New Bug report received and forwarded. Copy sent to Sam Hartman <hartmans@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: TANAKA Atushi <atanaka@hotcake.halfmoon.jp>
To: submit@bugs.debian.org
Subject: [INTL:ja] Japanese po-debconf template translation
Date: Sun, 11 Mar 2007 22:22:48 +0900
[Message part 1 (text/plain, inline)]
Package: krb5
Version: 1.4.4-7
Severity: minor
Tags: l10n patch 

Hello

Please find attached Japanese debconf templates translation,
proofread by Japanese debian developpers and users.
                                                                 
This file should be put as debian/po/ja.po in your package build
tree.
        
Sincerely

TANAKA, Atushi

[ja.po.gz (application/octet-stream, attachment)]

Tags added: pending Request was from hartmans@mit.edu to control@bugs.debian.org. (full text, mbox, link).


Reply sent to Sam Hartman <hartmans@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
Bug acknowledged by developer. (full text, mbox, link).


Message #12 received at 414382-close@bugs.debian.org (full text, mbox, reply):

From: Sam Hartman <hartmans@debian.org>
To: 414382-close@bugs.debian.org
Subject: Bug#414382: fixed in krb5 1.4.4-8
Date: Tue, 03 Apr 2007 19:02:05 +0000
Source: krb5
Source-Version: 1.4.4-8

We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive:

krb5-admin-server_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-admin-server_1.4.4-8_i386.deb
krb5-clients_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-clients_1.4.4-8_i386.deb
krb5-doc_1.4.4-8_all.deb
  to pool/main/k/krb5/krb5-doc_1.4.4-8_all.deb
krb5-ftpd_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-ftpd_1.4.4-8_i386.deb
krb5-kdc_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-kdc_1.4.4-8_i386.deb
krb5-rsh-server_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-rsh-server_1.4.4-8_i386.deb
krb5-telnetd_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-telnetd_1.4.4-8_i386.deb
krb5-user_1.4.4-8_i386.deb
  to pool/main/k/krb5/krb5-user_1.4.4-8_i386.deb
krb5_1.4.4-8.diff.gz
  to pool/main/k/krb5/krb5_1.4.4-8.diff.gz
krb5_1.4.4-8.dsc
  to pool/main/k/krb5/krb5_1.4.4-8.dsc
libkadm55_1.4.4-8_i386.deb
  to pool/main/k/krb5/libkadm55_1.4.4-8_i386.deb
libkrb5-dbg_1.4.4-8_i386.deb
  to pool/main/k/krb5/libkrb5-dbg_1.4.4-8_i386.deb
libkrb5-dev_1.4.4-8_i386.deb
  to pool/main/k/krb5/libkrb5-dev_1.4.4-8_i386.deb
libkrb53_1.4.4-8_i386.deb
  to pool/main/k/krb5/libkrb53_1.4.4-8_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 414382@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sam Hartman <hartmans@debian.org> (supplier of updated krb5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 11 Mar 2007 19:08:52 -0400
Source: krb5
Binary: krb5-doc libkrb5-dev krb5-rsh-server krb5-user krb5-ftpd libkadm55 libkrb53 krb5-clients krb5-telnetd krb5-kdc krb5-admin-server libkrb5-dbg
Architecture: source i386 all
Version: 1.4.4-8
Distribution: unstable
Urgency: emergency
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Sam Hartman <hartmans@debian.org>
Description: 
 krb5-admin-server - MIT Kerberos master server (kadmind)
 krb5-clients - Secure replacements for ftp, telnet and rsh using MIT Kerberos
 krb5-doc   - Documentation for MIT Kerberos
 krb5-ftpd  - Secure FTP server supporting MIT Kerberos
 krb5-kdc   - MIT Kerberos key server (KDC)
 krb5-rsh-server - Secure replacements for rshd and rlogind using MIT Kerberos
 krb5-telnetd - Secure telnet server supporting MIT Kerberos
 krb5-user  - Basic programs to authenticate using MIT Kerberos
 libkadm55  - MIT Kerberos administration runtime libraries
 libkrb5-dbg - Debugging files for MIT Kerberos
 libkrb5-dev - Headers and development libraries for MIT Kerberos
 libkrb53   - MIT Kerberos runtime libraries
Closes: 414382
Changes: 
 krb5 (1.4.4-8) unstable; urgency=emergency
 .
   * MIT-SA-2007-1: telnet allows  login as an arbitrary user when
     presented with a specially crafted username; CVE-2007-0956
   * krb5_klog_syslog has a trivial buffer overflow that can be exploited
     by network data; CVE-2007-0957.  The upstream patch is very intrusive
     because it fixes each call to syslog to have proper length checking as
     well as the actual krb5_klog_syslog internals to use vsnprintf rather
     than vsprintf.  I have chosen to only include the change to
     krb5_klog_syslog for sarge.  This is sufficient to fix the problem but
     is much smaller and less intrusive.   (MIT-SA-2007-2)
   * MIT-SA-2007-3: The GSS-API library can cause a double free if
     applications treat certain errors decoding a message as errors that
     require freeing the output buffer.  At least the gssapi rpc library
     does this, so kadmind is vulnerable.    Fix the gssapi library because
     the spec allows applications to treat errors this way.  CVE-2007-1216
   * New Japanese translation, thanks TANAKA Atushi, Closes: #414382
Files: 
 b1cfae2eab8636ee3a2f532e5b57b38b 866 net standard krb5_1.4.4-8.dsc
 a9753b63f09b1a614a3ff2abcbd99401 1585233 net standard krb5_1.4.4-8.diff.gz
 c546a01412cc97542779ed4ef0542f97 1811718 doc optional krb5-doc_1.4.4-8_all.deb
 764b770fdf72d7af9f8ebf78d89f0c54 173598 libs optional libkadm55_1.4.4-8_i386.deb
 d1770cf7f368a3d5268fe7b52c8fc6f0 407936 libs standard libkrb53_1.4.4-8_i386.deb
 ddfadb4b430b0229f0ac5db253533079 123774 net optional krb5-user_1.4.4-8_i386.deb
 3b24088c4ba0624c98ef1fd10f981d05 196070 net optional krb5-clients_1.4.4-8_i386.deb
 9d0d43f3963e1534525a3180fe59df1f 79858 net optional krb5-rsh-server_1.4.4-8_i386.deb
 79a0ad56e3c34965087b374e2d2076f0 57796 net extra krb5-ftpd_1.4.4-8_i386.deb
 a5a470ce065ede329c8554ac3db96cee 61986 net extra krb5-telnetd_1.4.4-8_i386.deb
 cdc6d97a0e17f0bbfa7be867de4675aa 132802 net optional krb5-kdc_1.4.4-8_i386.deb
 58bcde41c0cdd90672374b648e8b071d 78002 net optional krb5-admin-server_1.4.4-8_i386.deb
 62210af6feda85a0e2e12befada41f3a 679664 libdevel extra libkrb5-dev_1.4.4-8_i386.deb
 d4ab5b4b2f85b61c6cea0d879b0a73b9 1037432 libdevel extra libkrb5-dbg_1.4.4-8_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGEqFw/I12czyGJg8RAlMCAJoCrAwDC0+yxShqSVOqW3ZoabJrfwCg63DE
No481i4X7BFEX6T40Sz+EFk=
=Y05B
-----END PGP SIGNATURE-----




Reply sent to Sam Hartman <hartmans@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to TANAKA Atushi <atanaka@hotcake.halfmoon.jp>:
Bug acknowledged by developer. (full text, mbox, link).


Message #17 received at 414382-close@bugs.debian.org (full text, mbox, reply):

From: Sam Hartman <hartmans@debian.org>
To: 414382-close@bugs.debian.org
Subject: Bug#414382: fixed in krb5 1.4.4-7etch1
Date: Tue, 03 Apr 2007 21:32:11 +0000
Source: krb5
Source-Version: 1.4.4-7etch1

We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive:

krb5-admin-server_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-admin-server_1.4.4-7etch1_i386.deb
krb5-clients_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-clients_1.4.4-7etch1_i386.deb
krb5-doc_1.4.4-7etch1_all.deb
  to pool/main/k/krb5/krb5-doc_1.4.4-7etch1_all.deb
krb5-ftpd_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-ftpd_1.4.4-7etch1_i386.deb
krb5-kdc_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-kdc_1.4.4-7etch1_i386.deb
krb5-rsh-server_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_i386.deb
krb5-telnetd_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-telnetd_1.4.4-7etch1_i386.deb
krb5-user_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/krb5-user_1.4.4-7etch1_i386.deb
krb5_1.4.4-7etch1.diff.gz
  to pool/main/k/krb5/krb5_1.4.4-7etch1.diff.gz
krb5_1.4.4-7etch1.dsc
  to pool/main/k/krb5/krb5_1.4.4-7etch1.dsc
libkadm55_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/libkadm55_1.4.4-7etch1_i386.deb
libkrb5-dbg_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_i386.deb
libkrb5-dev_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/libkrb5-dev_1.4.4-7etch1_i386.deb
libkrb53_1.4.4-7etch1_i386.deb
  to pool/main/k/krb5/libkrb53_1.4.4-7etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 414382@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sam Hartman <hartmans@debian.org> (supplier of updated krb5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 11 Mar 2007 19:08:52 -0400
Source: krb5
Binary: krb5-doc libkrb5-dev krb5-rsh-server krb5-user krb5-ftpd libkadm55 libkrb53 krb5-clients krb5-telnetd krb5-kdc krb5-admin-server libkrb5-dbg
Architecture: source i386 all
Version: 1.4.4-7etch1
Distribution: testing-security
Urgency: emergency
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Sam Hartman <hartmans@debian.org>
Description: 
 krb5-admin-server - MIT Kerberos master server (kadmind)
 krb5-clients - Secure replacements for ftp, telnet and rsh using MIT Kerberos
 krb5-doc   - Documentation for MIT Kerberos
 krb5-ftpd  - Secure FTP server supporting MIT Kerberos
 krb5-kdc   - MIT Kerberos key server (KDC)
 krb5-rsh-server - Secure replacements for rshd and rlogind using MIT Kerberos
 krb5-telnetd - Secure telnet server supporting MIT Kerberos
 krb5-user  - Basic programs to authenticate using MIT Kerberos
 libkadm55  - MIT Kerberos administration runtime libraries
 libkrb5-dbg - Debugging files for MIT Kerberos
 libkrb5-dev - Headers and development libraries for MIT Kerberos
 libkrb53   - MIT Kerberos runtime libraries
Closes: 414382
Changes: 
 krb5 (1.4.4-7etch1) testing-security; urgency=emergency
 .
   * MIT-SA-2007-1: telnet allows  login as an arbitrary user when
     presented with a specially crafted username; CVE-2007-0956
   * krb5_klog_syslog has a trivial buffer overflow that can be exploited
     by network data; CVE-2007-0957.  The upstream patch is very intrusive
     because it fixes each call to syslog to have proper length checking as
     well as the actual krb5_klog_syslog internals to use vsnprintf rather
     than vsprintf.  I have chosen to only include the change to
     krb5_klog_syslog for sarge.  This is sufficient to fix the problem but
     is much smaller and less intrusive.   (MIT-SA-2007-2)
   * MIT-SA-2007-3: The GSS-API library can cause a double free if
     applications treat certain errors decoding a message as errors that
     require freeing the output buffer.  At least the gssapi rpc library
     does this, so kadmind is vulnerable.    Fix the gssapi library because
     the spec allows applications to treat errors this way.  CVE-2007-1216
   * New Japanese translation, thanks TANAKA Atushi, Closes: #414382
Files: 
 3c812c5bbd93a01103c67c50a15646be 876 net standard krb5_1.4.4-7etch1.dsc
 a675e5953bb8a29b5c6eb6f4ab0bb32a 11017910 net standard krb5_1.4.4.orig.tar.gz
 993d66c078ac0a5f6e29155c6973ee0a 1585246 net standard krb5_1.4.4-7etch1.diff.gz
 4b98ff8f04581e869209f96768c26ef5 1811728 doc optional krb5-doc_1.4.4-7etch1_all.deb
 a2f67bd332d2bc90732536606fb5af89 173608 libs optional libkadm55_1.4.4-7etch1_i386.deb
 6173bc1bb4e1ca40b911036ec34488c3 407958 libs standard libkrb53_1.4.4-7etch1_i386.deb
 2c0f795975289fdfc4254852ac5fe1c5 123794 net optional krb5-user_1.4.4-7etch1_i386.deb
 40cc5fc641d24fb1cb54d3aba24e51b0 196088 net optional krb5-clients_1.4.4-7etch1_i386.deb
 5bda94c68e5368047ed93665c734ec80 79888 net optional krb5-rsh-server_1.4.4-7etch1_i386.deb
 20aabab63e0976d38f0a72e9fa1f42d2 57822 net extra krb5-ftpd_1.4.4-7etch1_i386.deb
 17c4607112e571b22f95aa174502998c 62008 net extra krb5-telnetd_1.4.4-7etch1_i386.deb
 cef966062845545c71f5a6f84e6fdfc4 132828 net optional krb5-kdc_1.4.4-7etch1_i386.deb
 076140c9d3df111148f259a0c1aa2d34 78004 net optional krb5-admin-server_1.4.4-7etch1_i386.deb
 24d0bb8fea2a924b395126204448ea34 679676 libdevel extra libkrb5-dev_1.4.4-7etch1_i386.deb
 35fc79a9574582d3dc70e2e582300fce 1037458 libdevel extra libkrb5-dbg_1.4.4-7etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFF/4wy/I12czyGJg8RAr9PAJ9qupHKwukUlwj5O/Js+e0e+bcaYgCgmvOA
oAnoTDkaJk9FViLqkuP/Y2c=
=Bsf2
-----END PGP SIGNATURE-----




Tags added: pending Request was from hartmans@mit.edu to control@bugs.debian.org. (Sun, 22 Apr 2007 10:48:06 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 26 Jun 2007 19:56:26 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Jun 5 02:24:50 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.