Package: mupen64plus Version: 1.5+dfsg1-4 Severity: normal Please don't enable executable stack as this disables an important security feature on many platforms if a flaw is found that allows an attacker to fill stack memory with executable code.
--- Package information. --- Depends (Version) | Installed ====================================-+-================= libbz2-1.0 | 1.0.5-3 libc6 (>= 2.3) | 2.9-26 libfreetype6 (>= 2.2.1) | 2.3.9-5 libgcc1 (>= 1:4.1.1) | 1:4.4.1-4 libgl1-mesa-glx | 7.5.1-1 OR libgl1 | libglib2.0-0 (>= 2.16.0) | 2.21.6-1 libglu1-mesa | 7.5.1-1 OR libglu1 | libgtk2.0-0 (>= 2.12.0) | 2.17.11-1 liblzma0 (>= 4.999.7beta) | 4.999.8beta-1 libpango1.0-0 (>= 1.14.0) | 1.24.5-1 libpng12-0 (>= 1.2.13-4) | 1.2.39-1 libsamplerate0 | 0.1.7-2 libsdl-ttf2.0-0 | 2.0.9-1 libsdl1.2debian (>= 1.2.10-1) | 1.2.13-4+b1 libstdc++6 (>= 4.2.1) | 4.4.1-4 libxdg-basedir1 | 1.0.2-1 zlib1g (>= 1:1.1.4) | 1:1.2.3.3.dfsg-15 ttf-dejavu-core | 2.30-1 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org