[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

トップ ページ
このメッセージを削除
著者: admin
日付:  
To: pcre-dev
古いトピック: [pcre-dev] [Bug 1749] New: PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
題目: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

--- Comment #23 from Petr Pisar <ppisar@???> ---
No, it does not help. Change to R-- passes, subsequent change to R-X is denied.
After reading Linux security/selinux/hooks.c (search for default_noexec
variable), I think it simply refuses PROT_EXEC anytime if the mapping is not
backed by a file.

--
You are receiving this mail because:
You are on the CC list for the bug.