-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2538-1 firstname.lastname@example.org http://www.debian.org/security/ Raphael Geissert September 05, 2012 http://www.debian.org/security/faq
Package : moin Vulnerability : privilege escalation Problem type : remote Debian-specific: no CVE ID : CVE-2012-4404
It was discovered that Moin, a Python clone of WikiWiki, incorrectly evaluates ACLs when virtual groups are involved. This may allow certain users to have additional permissions (privilege escalation) or lack expected permissions.
For the stable distribution (squeeze), this problem has been fixed in version 1.9.3-1+squeeze2.
For the testing distribution (wheezy), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 1.9.4-8.
We recommend that you upgrade your moin packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: email@example.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAlBHnSAACgkQYy49rUbZzlpyrgCfWVw07a+DGjcWlbK09RF+Lw4Y JAcAn1AdHlyFq+OfCLZ4gQhfBXcqxpw/ =+e4Z -----END PGP SIGNATURE-----