Mailing the story:

Mandrake alert: Updated vim packages fix arbitrary command execution vulnerability

A vulnerability was discovered in vim by Georgi Guninski that allows arbitrary command execution using the libcall feature found in modelines. A patch to fix this problem was introduced in vim 6.1 patchlevel 265. This patch has been applied to the provided update packages.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?