Bug#656581: usbmuxd: buffer overflow introduced in 1.0.7 (CVE-2012-0065)

2012-01-23 Thread Yves-Alexis Perez
On dim., 2012-01-22 at 23:43 +0100, Julien Lavergne wrote: > Le 01/21/2012 09:14 AM, Yves-Alexis Perez a écrit : > > On ven., 2012-01-20 at 22:59 +0100, Julien Lavergne wrote: > >> > Thanks, revision 1.0.7-2 with the upstream patch is available on > >> > mentors. > > Does this mean you need one? >

Bug#656581: usbmuxd: buffer overflow introduced in 1.0.7 (CVE-2012-0065)

2012-01-22 Thread Julien Lavergne
Le 01/21/2012 09:14 AM, Yves-Alexis Perez a écrit : > On ven., 2012-01-20 at 22:59 +0100, Julien Lavergne wrote: >> > Thanks, revision 1.0.7-2 with the upstream patch is available on >> > mentors. > Does this mean you need one? Yes, my regular sponsor is not available, but I can do a proper RFS tom

Bug#656581: usbmuxd: buffer overflow introduced in 1.0.7 (CVE-2012-0065)

2012-01-21 Thread Yves-Alexis Perez
On ven., 2012-01-20 at 22:59 +0100, Julien Lavergne wrote: > Thanks, revision 1.0.7-2 with the upstream patch is available on > mentors. Does this mean you need one? -- Yves-Alexis signature.asc Description: This is a digitally signed message part

Bug#656581: usbmuxd: buffer overflow introduced in 1.0.7 (CVE-2012-0065)

2012-01-20 Thread Julien Lavergne
Le 01/20/2012 10:51 AM, Yves-Alexis Perez a écrit : > Package: usbmuxd > Version: 1.0.7-1 > Severity: grave > Tags: security patch upstream > Justification: user security hole > > Hi, > > a buffer overflow was introduced in usbmuxd 1.0.7. More information can > be found on various sources: > > http

Bug#656581: usbmuxd: buffer overflow introduced in 1.0.7 (CVE-2012-0065)

2012-01-20 Thread Yves-Alexis Perez
Package: usbmuxd Version: 1.0.7-1 Severity: grave Tags: security patch upstream Justification: user security hole Hi, a buffer overflow was introduced in usbmuxd 1.0.7. More information can be found on various sources: http://openwall.com/lists/oss-security/2012/01/19/25 https://secunia.com/advi