This bug was fixed in the package usbmuxd - 1.0.7-1ubuntu0.11.04.1

---------------
usbmuxd (1.0.7-1ubuntu0.11.04.1) natty-security; urgency=high

  * SECURITY UPDATE: fix possible buffer overflow
    - 90-cve-2012-0065.patch: use strncpy() instead of strcpy in
      libusbmuxd/libusbmuxd.c receive_packet() with a size that
      ensures we don't overflow dev->serial_number
    - CVE-2012-0065
    - LP: #919435
 -- Leo Iannacone <[email protected]>   Sun, 29 Jan 2012 16:14:32 +0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919435

Title:
  buffer overflow introduced in 1.0.7 (CVE-2012-0065)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usbmuxd/+bug/919435/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to