https://bugs.exim.org/show_bug.cgi?id=2445
--- Comment #5 from Zoltan Herczeg <hzmester@???> ---
Normally if jit cannot allocate executable memory, it just falls back to
interpreter. But if you know the target system is hardened, it is better to
disabling JIT since disallowing dynamic code generation is part of hardening. I
would be curious whether pcre jit was used to attack systems.
--
You are receiving this mail because:
You are on the CC list for the bug.