Your message dated Wed, 6 May 2026 23:34:10 +0200
with message-id <[email protected]>
and subject line RFP: gdb-exploitable -- GDB extension for classification of
bugs
has caused the Debian Bug report #869172,
regarding RFP: gdb-exploitable -- GDB extension for classification of bugs
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
869172: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869172
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Control: block 845133 by -1
* Package name : exploitable
Version : 1.32
Upstream Author : Jonathan Foote <[email protected]>
* URL : https://github.com/jfoote/exploitable
* License : Expat
Programming Lang: Python
Description : GDB extension for classification of bugs
>From the site: "'exploitable' is a GDB extension that classifies Linux
>application bugs by
severity. The extension inspects the state of a Linux application that has
crashed and outputs a
summary of how difficult it might be for an attacker to exploit the underlying
software bug to gain
control of the system. The extension can be used to prioritize bugs for
software developers so that
they can address the most severe ones first."
This hasn't been updated since 2015, but it's required by afl-utils.
Thanks,
Daniel Stender
--- End Message ---
--- Begin Message ---
dependent RFP closed.
--- End Message ---