Hi,

2010/8/27 Moritz Muehlenhoff <j...@inutil.org>:
> On Thu, Aug 26, 2010 at 08:21:42AM +0900, Nobuhiro Iwamatsu wrote:
>> tags 594414 lenny
>> thanks
>>
>> Hi,
>>
>> Thanks for your report.
>>
>> On Wed, Aug 25, 2010 at 09:58:56PM +0200, Moritz Muehlenhoff wrote:
>> > Package: slim
>> > Severity: grave
>> > Tags: security
>> >
>> > The following was reported to oss-security:
>> >
>> > --
>> >
>> > SLiM versions prior to 1.3.1 assigned logged on users a predefined PATH
>> > which included './'. This allowed unintentional code execution (e.g.
>> > planted binary) and has been fixed by the developers in version 1.3.2.
>> >
>> > Fix:
>> > http://svn.berlios.de/wsvn/slim?op=comp&compare[]=/@170&compare[]=/@171
>>
>> slim has this problem only lenny.
>> I'll fix soon.
>
> The impact seems rather low, I don't think we need a DSA for this?

OK. May I think this to be the official answer of the security team?
# Because you are member of security team.
Or I ask them (debian-security-priv...@lists.debian.org)judgment once?
>
> Could you fix this through a stable point update, please?
> http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
Sure. I am going to do this.

Best regards,
  Nobuhiro

-- 
Nobuhiro Iwamatsu
   iwamatsu at {nigauri.org / debian.org}
   GPG ID: 40AD1FA6



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to