This bug was fixed in the package malbolge - 0.2-0ubuntu1

---------------
malbolge (0.2-0ubuntu1) jaunty; urgency=low

  [ Toni Ruottu ]
  * New upstream version (LP #251311).
  * debian/control:     Updated Standards-Version to 3.8.0
  * debian/control:     Added Build-Depends-Indep: python-support
  * debian/control:     Changed Architecture to all (as intrepreter is now
    written in python)
  * debian/control:     Changed description
  * debian/copyright:   Small changes (authors job status)
  * debian/rules:       added build to .PHONY
  * debian/rules:       changed build and clean rules to affect the change of
    architecture (using binary-indep now)

  [ Arnaud Soyez ]
  * Changed debian/changelog release to Jaunty

 -- Arnaud Soyez <webo...@codealpha.net>  Tue, 11 Nov 2008 09:32:57
-0500


** Changed in: malbolge (Ubuntu)
       Status: Confirmed => Fix Released

-- 
Insufficient input sanitization leads to arbitrary code execution
https://bugs.launchpad.net/bugs/210098
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to