Bug#438593: marked as done (Format string vulnerability possibly allows arbitrary code execution)

Debian Bug Tracking System owner at bugs.debian.org
Sat Sep 1 20:09:26 UTC 2007


Your message dated Sat, 01 Sep 2007 19:56:28 +0000
with message-id <E1IRZ52-0006rF-B1 at ries.debian.org>
and subject line Bug#438593: fixed in vim 1:7.0-122+1etch3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

-------------- next part --------------
An embedded message was scrubbed...
From: Steffen Joeris <steffen.joeris at skolelinux.de>
Subject: sandbox for vim allows attackers to execute shell commands and write files
 via modelines
Date: Tue, 31 Jul 2007 23:44:38 +1000
Size: 2172
Url: http://lists.alioth.debian.org/pipermail/pkg-vim-maintainers/attachments/20070901/eb5af2e6/attachment-0002.eml 
-------------- next part --------------
An embedded message was scrubbed...
From: James Vega <jamessan at debian.org>
Subject: Bug#438593: fixed in vim 1:7.0-122+1etch3
Date: Sat, 01 Sep 2007 19:56:28 +0000
Size: 6449
Url: http://lists.alioth.debian.org/pipermail/pkg-vim-maintainers/attachments/20070901/eb5af2e6/attachment-0003.eml 


More information about the pkg-vim-maintainers mailing list