[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

Top Page
Delete this message
Author: admin
Date:  
To: pcre-dev
Old-Topics: [pcre-dev] [Bug 1749] New: PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
Subject: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

--- Comment #3 from Zoltan Herczeg <hzmester@???> ---
Do you know anybody who can help? I saw a source code before which created a
temporary file, but it does not seems secure at all since anybody can inspect
and change a temporary file. If would be great if somebody could explain to me
how this should work and why that is secure.

--
You are receiving this mail because:
You are on the CC list for the bug.