Actually, it would appear the version in Lucid isn't affected by this
flaw. The vulnerability seems to originate from this debian-specific
patch:
cfingerd (1.4.3-3) unstable; urgency=low
* Applied IPv6 patch from Mats Erik Andersson
<[email protected]> (closes: Bug#570024)
** Changed in: cfingerd (Ubuntu Lucid)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1104425
Title:
SECURITY: remotely-exploitable buffer overflow in cfingerd's rfc1413
(ident) client
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cfingerd/+bug/1104425/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs