Processed: Correctly clone the bug

Debian Bug Tracking System owner at bugs.debian.org
Sat Aug 18 02:57:07 UTC 2007


Processing commands for control at bugs.debian.org:

> package vim
Ignoring bugs not assigned to: vim

> clone 435401 -1
Bug#435401: sandbox for vim allows attackers to execute shell commands and write files via modelines
Bug 435401 cloned as bug 438593.

> retitle -1 Format string vulnerability possibly allows arbitrary code execution
Bug#438593: sandbox for vim allows attackers to execute shell commands and write files via modelines
Changed Bug title to `Format string vulnerability possibly allows arbitrary code execution' from `sandbox for vim allows attackers to execute shell commands and write files via modelines'.
(By the way, that Bug is currently marked as done.)

> tag -1 security
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Tags were: security
Tags added: security

> severity -1 grave
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Severity set to `grave' from `grave'

> found -1 1:7.0-122+1etch2
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Bug marked as found in version 1:7.0-122+1etch2.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)




More information about the pkg-vim-maintainers mailing list