Actually, it would appear the version in Lucid isn't affected by this
flaw. The vulnerability seems to originate from this debian-specific
patch:

cfingerd (1.4.3-3) unstable; urgency=low
   * Applied IPv6 patch from Mats Erik Andersson
     <[email protected]> (closes: Bug#570024)

** Changed in: cfingerd (Ubuntu Lucid)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1104425

Title:
  SECURITY: remotely-exploitable buffer overflow in cfingerd's rfc1413
  (ident) client

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cfingerd/+bug/1104425/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to