From secunia security advisory at $URL: Description: The vulnerability is caused due to a boundary error within the "receive_packet()" function (libusbmuxd/libusbmuxd.c) when processing a property list containing an overly long "SerialNumber" field, which can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow the execution of arbitrary code, but requires that the attacker is able to connect a malicious USB device. Solution: Fixed in the GIT repository. http://git.marcansoft.com/?p=usbmuxd.git;a=commitdiff;h=f794991993af56a74795891b4ff9da506bc893e6
Fixed by 1.0.7-r1, CCing amd64 and x86
amd64 stable
x86 stable. No hardware to test, though
Filed new request.
This issue was resolved and addressed in GLSA 201203-11 at http://security.gentoo.org/glsa/glsa-201203-11.xml by GLSA coordinator Sean Amoss (ackle).