Your message dated Thu, 6 Sep 2007 21:53:14 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#439226: CVE-2007-4462: arbitrary files overwriting
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: po4a
Severity: serious
Tags: security

Hi,

A security issue has been reported against your package po4a:

> lib/Locale/Po4a/Po.pm in po4a before 0.32 allows local users to overwrite
> arbitrary files via a symlink attack on the gettextization.failed.po
> temporary file.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462
It seems the new upstream 0.32 fixes this.

Please mention the CVE id in the changelog when fixing this.
Also please check whether stable and oldstable are vulneable and coordinate 
with the security team.


Thanks,
Thijs

Attachment: pgpxQSxE6bvOZ.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 0.31-1

The fix was included in the Debian 0.31-1 package. Closing the bug
accordingly.

The risk is quite low and will not deserve a DSA.

I asked the stable release managers whether the fix could be included in
sarge and etch.

Kind Regards,
-- 
Nekral

--- End Message ---

Reply via email to