Processed: Correctly clone the bug
Debian Bug Tracking System
owner at bugs.debian.org
Sat Aug 18 02:57:07 UTC 2007
Processing commands for control at bugs.debian.org:
> package vim
Ignoring bugs not assigned to: vim
> clone 435401 -1
Bug#435401: sandbox for vim allows attackers to execute shell commands and write files via modelines
Bug 435401 cloned as bug 438593.
> retitle -1 Format string vulnerability possibly allows arbitrary code execution
Bug#438593: sandbox for vim allows attackers to execute shell commands and write files via modelines
Changed Bug title to `Format string vulnerability possibly allows arbitrary code execution' from `sandbox for vim allows attackers to execute shell commands and write files via modelines'.
(By the way, that Bug is currently marked as done.)
> tag -1 security
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Tags were: security
Tags added: security
> severity -1 grave
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Severity set to `grave' from `grave'
> found -1 1:7.0-122+1etch2
Bug#438593: Format string vulnerability possibly allows arbitrary code execution
Bug marked as found in version 1:7.0-122+1etch2.
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
More information about the pkg-vim-maintainers
mailing list