Processing commands for [EMAIL PROTECTED]:

> package vim
Ignoring bugs not assigned to: vim

> clone 435401 -1
Bug#435401: sandbox for vim allows attackers to execute shell commands and 
write files via modelines
Bug 435401 cloned as bug 438593.

> retitle -1 Format string vulnerability possibly allows arbitrary code 
> execution
Bug#438593: sandbox for vim allows attackers to execute shell commands and 
write files via modelines
Changed Bug title to `Format string vulnerability possibly allows arbitrary 
code execution' from `sandbox for vim allows attackers to execute shell 
commands and write files via modelines'.
(By the way, that Bug is currently marked as done.)

> tag -1 security
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Tags were: security
Tags added: security

> severity -1 grave
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Severity set to `grave' from `grave'

> found -1 1:7.0-122+1etch2
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Bug marked as found in version 1:7.0-122+1etch2.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to