Package: mupen64plus
Version: 1.5+dfsg1-4
Severity: normal

Please don't enable executable stack as this disables an important security 
feature on many platforms if a flaw is found that allows an attacker to fill 
stack memory with executable code.



--- Package information. ---
Depends                    (Version) | Installed
====================================-+-=================
libbz2-1.0                           | 1.0.5-3
libc6                       (>= 2.3) | 2.9-26
libfreetype6              (>= 2.2.1) | 2.3.9-5
libgcc1                 (>= 1:4.1.1) | 1:4.4.1-4
libgl1-mesa-glx                      | 7.5.1-1
 OR libgl1                           | 
libglib2.0-0             (>= 2.16.0) | 2.21.6-1
libglu1-mesa                         | 7.5.1-1
 OR libglu1                          | 
libgtk2.0-0              (>= 2.12.0) | 2.17.11-1
liblzma0            (>= 4.999.7beta) | 4.999.8beta-1
libpango1.0-0            (>= 1.14.0) | 1.24.5-1
libpng12-0             (>= 1.2.13-4) | 1.2.39-1
libsamplerate0                       | 0.1.7-2
libsdl-ttf2.0-0                      | 2.0.9-1
libsdl1.2debian        (>= 1.2.10-1) | 1.2.13-4+b1
libstdc++6                (>= 4.2.1) | 4.4.1-4
libxdg-basedir1                      | 1.0.2-1
zlib1g                  (>= 1:1.1.4) | 1:1.2.3.3.dfsg-15
ttf-dejavu-core                      | 2.30-1






-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to