This bug was fixed in the package malbolge - 0.2-0ubuntu1 --------------- malbolge (0.2-0ubuntu1) jaunty; urgency=low
[ Toni Ruottu ] * New upstream version (LP #251311). * debian/control: Updated Standards-Version to 3.8.0 * debian/control: Added Build-Depends-Indep: python-support * debian/control: Changed Architecture to all (as intrepreter is now written in python) * debian/control: Changed description * debian/copyright: Small changes (authors job status) * debian/rules: added build to .PHONY * debian/rules: changed build and clean rules to affect the change of architecture (using binary-indep now) [ Arnaud Soyez ] * Changed debian/changelog release to Jaunty -- Arnaud Soyez <webo...@codealpha.net> Tue, 11 Nov 2008 09:32:57 -0500 ** Changed in: malbolge (Ubuntu) Status: Confirmed => Fix Released -- Insufficient input sanitization leads to arbitrary code execution https://bugs.launchpad.net/bugs/210098 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs