Processing commands for cont...@bugs.debian.org: > package logrotate Limiting to bugs with field 'package' containing at least one of 'logrotate' Limit currently set to 'package':'logrotate'
> forcemerge 388608 606595 606596 606597 606598 606599 606601 606602 606608 > 606609 Bug#388608: logrotate: Creation of files has race condition that could allow unintended file access Bug#606595: bacula-common: affected by privilege escalation vulnerability in logrotate Bug#606596: binkd: affected by privilege escalation vulnerability in logrotate Bug#606597: tinyhoneypot: affected by privilege escalation vulnerability in logrotate Bug#606598: net-acct: affected by privilege escalation vulnerability in logrotate Bug#606599: mrtg: affected by privilege escalation vulnerability in logrotate Bug#606601: mysql-server-5.0: affected by privilege escalation vulnerability in logrotate Bug#606602: lighttpd: affected by privilege escalation vulnerability in logrotate Bug#606608: squid: affected by privilege escalation vulnerability in logrotate Bug#606609: icecast2: affected by privilege escalation vulnerability in logrotate Bug#606541: zabbix-server-mysql: affected by privilege escalation vulnerability in logrotate Bug#606543: clamav-freshclam: affected by privilege escalation vulnerability in logrotate Bug#606544: postgresql-common: affected by privilege escalation vulnerability in logrotate Bug#606545: polipo: affected by privilege escalation vulnerability in logrotate Bug#606547: mathopd: affected by privilege escalation vulnerability in logrotate Bug#606548: pymsnt: affected by privilege escalation vulnerability in logrotate Bug#606549: bayonne: affected by privilege escalation vulnerability in logrotate Bug#606551: ejabberd: affected by privilege escalation vulnerability in logrotate Bug#606552: flumotion: affected by privilege escalation vulnerability in logrotate Bug#606553: conserver-server: affected by privilege escalation vulnerability in logrotate Bug#606554: aolserver4: affected by privilege escalation vulnerability in logrotate Bug#606555: qwik: affected by privilege escalation vulnerability in logrotate Bug#606560: pyaimt: affected by privilege escalation vulnerability in logrotate Bug#606561: zabbix-agent: affected by privilege escalation vulnerability in logrotate Bug#606562: zabbix-server-pgsql: affected by privilege escalation vulnerability in logrotate Bug#606563: mumble-server: affected by privilege escalation vulnerability in logrotate Bug#606566: cacti: affected by privilege escalation vulnerability in logrotate Bug#606567: ecartis: affected by privilege escalation vulnerability in logrotate Bug#606568: cherokee: affected by privilege escalation vulnerability in logrotate Bug#606569: couchdb: affected by privilege escalation vulnerability in logrotate Bug#606570: privoxy: affected by privilege escalation vulnerability in logrotate Bug#606571: debtorrent: affected by privilege escalation vulnerability in logrotate Bug#606572: speech-dispatcher: affected by privilege escalation vulnerability in logrotate Bug#606573: slony1-bin: affected by privilege escalation vulnerability in logrotate Bug#606580: squid3: affected by privilege escalation vulnerability in logrotate Bug#606581: tor: affected by privilege escalation vulnerability in logrotate Bug#606582: mserv: affected by privilege escalation vulnerability in logrotate Bug#606583: cricket: affected by privilege escalation vulnerability in logrotate Bug#606584: dansguardian: affected by privilege escalation vulnerability in logrotate Bug#606585: sks: affected by privilege escalation vulnerability in logrotate Bug#606586: sbnc: affected by privilege escalation vulnerability in logrotate Bug#606587: epos: affected by privilege escalation vulnerability in logrotate Bug#606600: pyicqt: affected by privilege escalation vulnerability in logrotate Forcibly Merged 388608 606541 606543 606544 606545 606547 606548 606549 606551 606552 606553 606554 606555 606560 606561 606562 606563 606566 606567 606568 606569 606570 606571 606572 606573 606580 606581 606582 606583 606584 606585 606586 606587 606595 606596 606597 606598 606599 606600 606601 606602 606608 606609. > thanks Stopping processing here. Please contact me if you need assistance. -- 606570: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606570 388608: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=388608 606601: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606601 606582: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606582 606587: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606587 606599: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606599 606561: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606561 606567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606567 606597: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606597 606544: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544 606560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606560 606554: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606554 606584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606584 606602: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606602 606569: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606569 606562: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606562 606580: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606580 606573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606573 606568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606568 606543: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606543 606585: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606585 606549: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606549 606555: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606555 606596: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606596 606553: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606553 606547: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606547 606552: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606552 606598: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606598 606566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606566 606541: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606541 606581: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606581 606586: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606586 606563: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606563 606545: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606545 606551: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606551 606571: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606571 606572: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606572 606548: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606548 606600: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606600 606609: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606609 606583: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606583 606608: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606608 606595: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606595 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org