[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

Top Page
Delete this message
Author: admin
Date:  
To: pcre-dev
Subject: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

Zoltan Herczeg <hzmester@???> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |hzmester@???


--- Comment #1 from Zoltan Herczeg <hzmester@???> ---
Good idea. It would be great if somebody with security experience could
contribute a patch since I know little about OS security and never used SELinux
before.

Some kind of write / execute permission is needed, since patterns can be
executed by other threads while the allocator manages the memory.

--
You are receiving this mail because:
You are on the CC list for the bug.