This bug was fixed in the package malbolge - 0.2-0ubuntu1
---------------
malbolge (0.2-0ubuntu1) jaunty; urgency=low
[ Toni Ruottu ]
* New upstream version (LP #251311).
* debian/control: Updated Standards-Version to 3.8.0
* debian/control: Added Build-Depends-Indep: python-support
* debian/control: Changed Architecture to all (as intrepreter is now
written in python)
* debian/control: Changed description
* debian/copyright: Small changes (authors job status)
* debian/rules: added build to .PHONY
* debian/rules: changed build and clean rules to affect the change of
architecture (using binary-indep now)
[ Arnaud Soyez ]
* Changed debian/changelog release to Jaunty
-- Arnaud Soyez <[email protected]> Tue, 11 Nov 2008 09:32:57
-0500
** Changed in: malbolge (Ubuntu)
Status: Confirmed => Fix Released
--
Insufficient input sanitization leads to arbitrary code execution
https://bugs.launchpad.net/bugs/210098
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs