Debian Security Advisory DSA 1768-1 (openafs)

Summary
The remote host is missing an update to openafs announced via advisory DSA 1768-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201768-1
Insight
Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system. An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding. (CVE-2009-1251) An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module. (CVE-2009-1250). Note that in order to apply this security update, you must rebuild the OpenAFS kernel module. Be sure to also upgrade openafs-modules-source, build a new kernel module for your system following the instructions in /usr/share/doc/openafs-client/README.modules.gz, and then either stop and restart openafs-client or reboot the system to reload the kernel module. For the old stable distribution (etch), these problems have been fixed in version 1.4.2-6etch2. For the stable distribution (lenny), these problems have been fixed in version 1.4.7.dfsg1-6+lenny1. For the unstable distribution (sid), these problems have been fixed in version 1.4.10+dfsg1-1. We recommend that you upgrade your openafs packages.