Processing commands for [EMAIL PROTECTED]: > tags 383314 - patch Bug#383314: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144] Tags were: patch security Tags removed: patch
> clone 383314 -1 Bug#383314: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144] Bug 383314 cloned as bug 383333. > reassign -1 graphicsmagick Bug#383333: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144] Bug reassigned from package `libmagick9' to `graphicsmagick'. > retitle -1 libgraphicsmagick1: Buffer overflow in SGI parser [CVE-2006-4144] Bug#383333: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144] Changed Bug title. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]