Your message dated Thu, 6 Sep 2007 21:53:14 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#439226: CVE-2007-4462: arbitrary files overwriting has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: po4a Severity: serious Tags: security Hi, A security issue has been reported against your package po4a: > lib/Locale/Po4a/Po.pm in po4a before 0.32 allows local users to overwrite > arbitrary files via a symlink attack on the gettextization.failed.po > temporary file. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462 It seems the new upstream 0.32 fixes this. Please mention the CVE id in the changelog when fixing this. Also please check whether stable and oldstable are vulneable and coordinate with the security team. Thanks, ThijspgpxQSxE6bvOZ.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---Version: 0.31-1 The fix was included in the Debian 0.31-1 package. Closing the bug accordingly. The risk is quite low and will not deserve a DSA. I asked the stable release managers whether the fix could be included in sarge and etch. Kind Regards, -- Nekral
--- End Message ---