[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

Top Page

Reply to this message
Author: admin
Date:  
To: pcre-dev
Old-Topics: [pcre-dev] [Bug 1749] New: PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
Subject: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

--- Comment #50 from Petr Pisar <ppisar@???> ---
I'm thinking the decision to implement the sealocator was a mistake. At the end
it only workaround imperfect security checks in the kernel (SELinux or
FreeBSD). The checks exist to prevent from executing at run-time hand-written
machine code. And this is what JIT is.

--
You are receiving this mail because:
You are on the CC list for the bug.