lfs/chapter05
Xi Ruoyao e502de1ab0
gcc: some reword of PIE/SSP/ASLR note
Expand tabs to 8 spaces like everywhere else in the book.

Explain that shared libraries are already covered by ASLR, PIE expands
the ASLR to cover the exetutables.

In 2022, stack smashing attackings are mostly constructing a sequence of
faked returning addresses to exectute a series of function already
existing in the programs or libraries itself (ret2lib).  Returning into
the code injected by the attacker is almost impossible because on
i686 (with a PAE/NX enabled kernel) or x86_64, running injected code
needs W/X mappings and those are very rare these days.
2022-09-11 11:35:06 +08:00
..
binutils-pass1.xml Package updates. 2022-08-06 17:40:17 -05:00
chapter05.xml
gcc-pass1.xml gcc: some reword of PIE/SSP/ASLR note 2022-09-11 11:35:06 +08:00
glibc.xml Don't use dummy.c for glibc sanity check in chap 5 2022-08-25 09:24:58 +02:00
introduction.xml
libstdc++.xml Remove libtool archive (.la) files in Chapter 5 and 6 2022-08-19 12:41:48 +08:00
linux-headers.xml Remove all non header files in linux headers 2022-08-31 21:34:49 +02:00