+openafs (1.6.1-3) UNRELEASED; urgency=high
+
+ * Apply upstream security patches:
+ - OPENAFS-SA-2013-001: Fix fileserver buffer overflow when parsing
+ client-supplied ACL entries and protect against client parsing of
+ bad ACL entries.
+ - OPENAFS-SA-2013-002: Fix ptserver buffer overflow via integer
+ overflow in the IdToName RPC.
+
+ -- Russ Allbery <rra@debian.org> Sun, 24 Feb 2013 15:01:49 -0800
+
openafs (1.6.1-2) unstable; urgency=low
* Translation updates: