[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

Página Inicial
Delete this message
Autor: admin
Data:  
Para: pcre-dev
Tópicos Antigos: [pcre-dev] [Bug 1749] New: PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
Assunto: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

--- Comment #50 from Petr Pisar <ppisar@???> ---
I'm thinking the decision to implement the sealocator was a mistake. At the end
it only workaround imperfect security checks in the kernel (SELinux or
FreeBSD). The checks exist to prevent from executing at run-time hand-written
machine code. And this is what JIT is.

--
You are receiving this mail because:
You are on the CC list for the bug.