From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id 3DBC53858C53 for ; Fri, 5 Aug 2022 12:58:22 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 3DBC53858C53 Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-304-YSWd-Dw1MzWMD1Mv4wFJcQ-1; Fri, 05 Aug 2022 08:58:18 -0400 X-MC-Unique: YSWd-Dw1MzWMD1Mv4wFJcQ-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 84559185A79C; Fri, 5 Aug 2022 12:58:18 +0000 (UTC) Received: from comet.redhat.com (unknown [10.39.194.34]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E2A4E2166B26; Fri, 5 Aug 2022 12:58:17 +0000 (UTC) From: Nick Clifton To: binutils@sourceware.org, info-gnu@gnu.org, dje.gcc@gmail.com Subject: GNU Binutils 2.39 Released Date: Fri, 05 Aug 2022 13:58:16 +0100 Message-ID: <87r11usv87.fsf@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, KAM_LOTSOFHASH, KAM_SHORT, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Aug 2022 12:58:23 -0000 Hi Everyone, We are pleased to announce that version 2.39 of the GNU Binutils project sources have been released and are now available for download at: https://ftp.gnu.org/gnu/binutils https://sourceware.org/pub/binutils/releases/ sha256 checksums: da24a84fef220102dd24042df06fdea851c2614a5377f86effa28f33b7b16148 binutils-2.39.tar.bz2 d677fd7b597c8dcb85030233deac4296034df92d548b2c1e412023f16495436d binutils-2.39.tar.bz2.sig d12ea6f239f1ffe3533ea11ad6e224ffcb89eb5d01bbea589e9158780fa11f10 binutils-2.39.tar.gz 465b1f87e1cc3c724864087e26d2de736dd08bfe4d1761e7f7681665e63ee244 binutils-2.39.tar.gz.sig 5ab51668874d8533201b8edd2edb5e5d81d588205c6da300c8919bd7cf8664e8 binutils-2.39.tar.lz bd252be26a70822c055c89390206d16d5704416094da8d24fd72efbab7e20005 binutils-2.39.tar.lz.sig 645c25f563b8adc0a81dbd6a41cffbf4d37083a382e02d5d3df4f65c09516d00 binutils-2.39.tar.xz 1b63c8b51f3e7762bdcd51985deff1e66249b5cda0e849ef960ce1495320c932 binutils-2.39.tar.xz.sig This release contains numerous bug fixes, and also the following new features: * The ELF linker will now generate a warning message if the stack is made executable. Similarly it will warn if the output binary contains a segment with all three of the read, write and execute permission bits set. These warnings are intended to help developers identify programs which might be vulnerable to attack via these executable memory regions. The warnings are enabled by default but can be disabled via a command line option. It is also possible to build a linker with the warnings disabled, should that be necessary. * The ELF linker now supports a --package-metadata option that allows embedding a JSON payload in accordance to the Package Metadata specification. * In linker scripts it is now possible to use TYPE= in an output section description to set the section type value. * The objdump program now supports coloured/colored syntax highlighting of its disassembler output for some architectures. (Currently: AVR, RiscV, s390, x86, x86_64). * The nm program now supports a --no-weak/-W option to make it ignore weak symbols. * The readelf and objdump programs now support a -wE option to prevent them from attempting to access debuginfod servers when following links. * The objcopy program's --weaken, --weaken-symbol, and --weaken-symbols options now works with unique symbols as well. Our thanks go out to all of the binutils contributors, past and present, for helping to make this release possible. Cheers Nick Clifton GNU Binutils Release Manager