Processing commands for cont...@bugs.debian.org:

> package logrotate
Limiting to bugs with field 'package' containing at least one of 'logrotate'
Limit currently set to 'package':'logrotate'

> forcemerge 388608 606595 606596 606597 606598 606599 606601 606602 606608 
> 606609
Bug#388608: logrotate: Creation of files has race condition that could allow 
unintended file access
Bug#606595: bacula-common: affected by privilege escalation vulnerability in 
logrotate
Bug#606596: binkd: affected by privilege escalation vulnerability in logrotate
Bug#606597: tinyhoneypot: affected by privilege escalation vulnerability in 
logrotate
Bug#606598: net-acct: affected by privilege escalation vulnerability in 
logrotate
Bug#606599: mrtg: affected by privilege escalation vulnerability in logrotate
Bug#606601: mysql-server-5.0: affected by privilege escalation vulnerability in 
logrotate
Bug#606602: lighttpd: affected by privilege escalation vulnerability in 
logrotate
Bug#606608: squid: affected by privilege escalation vulnerability in logrotate
Bug#606609: icecast2: affected by privilege escalation vulnerability in 
logrotate
Bug#606541: zabbix-server-mysql: affected by privilege escalation vulnerability 
in logrotate
Bug#606543: clamav-freshclam: affected by privilege escalation vulnerability in 
logrotate
Bug#606544: postgresql-common: affected by privilege escalation vulnerability 
in logrotate
Bug#606545: polipo: affected by privilege escalation vulnerability in logrotate
Bug#606547: mathopd: affected by privilege escalation vulnerability in logrotate
Bug#606548: pymsnt: affected by privilege escalation vulnerability in logrotate
Bug#606549: bayonne: affected by privilege escalation vulnerability in logrotate
Bug#606551: ejabberd: affected by privilege escalation vulnerability in 
logrotate
Bug#606552: flumotion: affected by privilege escalation vulnerability in 
logrotate
Bug#606553: conserver-server: affected by privilege escalation vulnerability in 
logrotate
Bug#606554: aolserver4: affected by privilege escalation vulnerability in 
logrotate
Bug#606555: qwik: affected by privilege escalation vulnerability in logrotate
Bug#606560: pyaimt: affected by privilege escalation vulnerability in logrotate
Bug#606561: zabbix-agent: affected by privilege escalation vulnerability in 
logrotate
Bug#606562: zabbix-server-pgsql: affected by privilege escalation vulnerability 
in logrotate
Bug#606563: mumble-server: affected by privilege escalation vulnerability in 
logrotate
Bug#606566: cacti: affected by privilege escalation vulnerability in logrotate
Bug#606567: ecartis: affected by privilege escalation vulnerability in logrotate
Bug#606568: cherokee: affected by privilege escalation vulnerability in 
logrotate
Bug#606569: couchdb: affected by privilege escalation vulnerability in logrotate
Bug#606570: privoxy: affected by privilege escalation vulnerability in logrotate
Bug#606571: debtorrent: affected by privilege escalation vulnerability in 
logrotate
Bug#606572: speech-dispatcher: affected by privilege escalation vulnerability 
in logrotate
Bug#606573: slony1-bin: affected by privilege escalation vulnerability in 
logrotate
Bug#606580: squid3: affected by privilege escalation vulnerability in logrotate
Bug#606581: tor: affected by privilege escalation vulnerability in logrotate
Bug#606582: mserv: affected by privilege escalation vulnerability in logrotate
Bug#606583: cricket: affected by privilege escalation vulnerability in logrotate
Bug#606584: dansguardian: affected by privilege escalation vulnerability in 
logrotate
Bug#606585: sks: affected by privilege escalation vulnerability in logrotate
Bug#606586: sbnc: affected by privilege escalation vulnerability in logrotate
Bug#606587: epos: affected by privilege escalation vulnerability in logrotate
Bug#606600: pyicqt: affected by privilege escalation vulnerability in logrotate
Forcibly Merged 388608 606541 606543 606544 606545 606547 606548 606549 606551 
606552 606553 606554 606555 606560 606561 606562 606563 606566 606567 606568 
606569 606570 606571 606572 606573 606580 606581 606582 606583 606584 606585 
606586 606587 606595 606596 606597 606598 606599 606600 606601 606602 606608 
606609.

> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
606570: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606570
388608: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=388608
606601: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606601
606582: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606582
606587: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606587
606599: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606599
606561: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606561
606567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606567
606597: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606597
606544: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544
606560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606560
606554: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606554
606584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606584
606602: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606602
606569: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606569
606562: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606562
606580: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606580
606573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606573
606568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606568
606543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606543
606585: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606585
606549: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606549
606555: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606555
606596: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606596
606553: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606553
606547: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606547
606552: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606552
606598: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606598
606566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606566
606541: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606541
606581: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606581
606586: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606586
606563: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606563
606545: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606545
606551: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606551
606571: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606571
606572: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606572
606548: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606548
606600: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606600
606609: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606609
606583: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606583
606608: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606608
606595: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606595
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to