[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21514 [Applications/Tor Browser]: Deal with W^X backport bustage in upcoming ESR release
#21514: Deal with W^X backport bustage in upcoming ESR release
--------------------------------------+---------------------------------
Reporter: gk | Owner: arthuredelstein
Type: task | Status: needs_review
Priority: Very High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: TorBrowserTeam201702 | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+---------------------------------
Changes (by arthuredelstein):
* status: accepted => needs_review
Comment:
I believe I have finally got it working:
https://github.com/arthuredelstein/tor-browser/commit/21514+4
Thanks to Jan de Mooij for looking it over and helpful advice.
So far I have tested on Linux, but this will need testing on Windows and
Mac at least to show that it doesn't cause a crash. I am reasonably
confident the code covers all three platforms.
Jan also suggested we could examine the memory maps with and without the
patch, using `gdb` or `/proc/pid/maps` on Linux and `VMMap` on Windows. He
points out that without the patch we should hopefully observe multiple rwx
regions.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21514#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs