Issue 43796 in oss-fuzz: binutils:fuzz_as: Direct-leak in xmalloc

2022-04-19 Thread sheriffbot via monorail
Updates: Labels: -restrict-view-commit -deadline-approaching Deadline-Exceeded Comment #3 on issue 43796 by sheriffbot: binutils:fuzz_as: Direct-leak in xmalloc https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43796#c3 This bug has exceeded our disclosure deadline. It has been opene

[Bug gas/29067] gas: -gsomething-not-already-a-long-option does not get a diagnostic

2022-04-19 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29067 H.J. Lu changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug gprofng/29015] On Intel Skylake the call tree is incorrect

2022-04-19 Thread kurt.goebel at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29015 Kurt Goebel changed: What|Removed |Added Status|UNCONFIRMED |NEW Ever confirmed|0

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread ian at airs dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 Ian Lance Taylor changed: What|Removed |Added CC||ian at airs dot com --- Comment #5

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 --- Comment #4 from Nick Clifton --- Working on a fix. It adds two new warnings to the linker: warning: enabling an executable stack because of an executable .note.GNU-stack section in and: warning: enabling an executable stack becaus

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread rui314 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 --- Comment #3 from Rui Ueyama --- Right. Unless you know the default behavior of GNU ld, it is very hard to foresee that adding a benign assembler file to your project could make it significantly vulnerable to the traditional stack overflow a

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread sch...@linux-m68k.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 --- Comment #2 from Andreas Schwab --- More often, it's the lack of the stack note in an assembler source that inadvertently makes the stack executable, on platforms where it is the default. -- You are receiving this mail because: You are on

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 Nick Clifton changed: What|Removed |Added Status|UNCONFIRMED |ASSIGNED Assignee|unassigned

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread sch...@linux-m68k.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 --- Comment #1 from Andreas Schwab --- Nested functions by itself don't require executable stacks, only when the address of such a function is passed outside its scope. -- You are receiving this mail because: You are on the CC list for the b

[Bug ld/29072] ld silently make the program stack area executable if nested function is used

2022-04-19 Thread mliska at suse dot cz
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 Martin Liska changed: What|Removed |Added CC||mliska at suse dot cz -- You are rece

[Bug ld/29072] New: ld silently make the program stack area executable if nested function is used

2022-04-19 Thread rui314 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29072 Bug ID: 29072 Summary: ld silently make the program stack area executable if nested function is used Product: binutils Version: unspecified Status: UNCONFIRMED