-openafs (1.4.12.1+dfsg-4+squeeze1) UNRELEASED; urgency=high
+openafs (1.4.12.1+dfsg-4+squeeze1) stable-security; urgency=high
* Apply upstream security patches:
- OPENAFS-SA-2013-001: Fix fileserver buffer overflow when parsing
client-supplied ACL entries and protect against client parsing of
- bad ACL entries.
+ bad ACL entries. (CVE-2013-1794)
- OPENAFS-SA-2013-002: Fix ptserver buffer overflow via integer
- overflow in the IdToName RPC.
+ overflow in the IdToName RPC. (CVE-2013-1795)
- -- Russ Allbery <rra@debian.org> Sun, 24 Feb 2013 15:07:45 -0800
+ -- Russ Allbery <rra@debian.org> Fri, 01 Mar 2013 14:10:52 -0800
openafs (1.4.12.1+dfsg-4) stable-security; urgency=high