Package: dietlibc-dev
Version: 0.33~cvs20120325-6
Severity: normal

Dear Maintainer,

all programs made with diet gcc ...
have executable stacks. They should not.

Workaround:
Some tiny programs I tried worked after 
execstack -c prog
to clear the executable stack flag.

Is this a security issue?
Are statically linked programs not a security risk,
even with executable stacks?
My programs all have fprintf...arg[0] or ~.

-- System Information:
Debian Release: wheezy/sid
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'unstable'), 
(500, 'testing'), (500, 'oldstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.4.4 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)
Shell: /bin/sh linked to /UNIONFS/bin/bash

dietlibc-dev depends on no packages.

dietlibc-dev recommends no packages.

Versions of packages dietlibc-dev suggests:
pn  dietlibc-doc  <none>

-- no debconf information

-- 
Charles Evans <cvev...@users.sourceforge.net>


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to