Package: dietlibc-dev Version: 0.33~cvs20120325-6 Severity: normal
Dear Maintainer, all programs made with diet gcc ... have executable stacks. They should not. Workaround: Some tiny programs I tried worked after execstack -c prog to clear the executable stack flag. Is this a security issue? Are statically linked programs not a security risk, even with executable stacks? My programs all have fprintf...arg[0] or ~. -- System Information: Debian Release: wheezy/sid APT prefers stable APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'unstable'), (500, 'testing'), (500, 'oldstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.4.4 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) Shell: /bin/sh linked to /UNIONFS/bin/bash dietlibc-dev depends on no packages. dietlibc-dev recommends no packages. Versions of packages dietlibc-dev suggests: pn dietlibc-doc <none> -- no debconf information -- Charles Evans <cvev...@users.sourceforge.net> -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org