A flaw was found in the way Logwatch processed log files. If an attacker
were able to create a log file with a malicious file name, it could
result in arbitrary code execution with the privileges of the root user
when that log file is analyzed by Logwatch. (CVE-2011-1018)