Processing commands for [EMAIL PROTECTED]:

> tags 383314 - patch
Bug#383314: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144]
Tags were: patch security
Tags removed: patch

> clone 383314 -1
Bug#383314: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144]
Bug 383314 cloned as bug 383333.

> reassign -1 graphicsmagick
Bug#383333: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144]
Bug reassigned from package `libmagick9' to `graphicsmagick'.

> retitle -1 libgraphicsmagick1: Buffer overflow in SGI parser [CVE-2006-4144]
Bug#383333: libmagick9: Buffer overflow in SGI parser [CVE-2006-4144]
Changed Bug title.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to