Processing commands for [EMAIL PROTECTED]: > package vim Ignoring bugs not assigned to: vim
> clone 435401 -1 Bug#435401: sandbox for vim allows attackers to execute shell commands and write files via modelines Bug 435401 cloned as bug 438593. > retitle -1 Format string vulnerability possibly allows arbitrary code > execution Bug#438593: sandbox for vim allows attackers to execute shell commands and write files via modelines Changed Bug title to `Format string vulnerability possibly allows arbitrary code execution' from `sandbox for vim allows attackers to execute shell commands and write files via modelines'. (By the way, that Bug is currently marked as done.) > tag -1 security Bug#438593: Format string vulnerability possibly allows arbitrary code execution Tags were: security Tags added: security > severity -1 grave Bug#438593: Format string vulnerability possibly allows arbitrary code execution Severity set to `grave' from `grave' > found -1 1:7.0-122+1etch2 Bug#438593: Format string vulnerability possibly allows arbitrary code execution Bug marked as found in version 1:7.0-122+1etch2. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

