mirror of
https://git.linuxfromscratch.org/lfs.git
synced 2025-01-19 13:37:39 +00:00
e502de1ab0
Expand tabs to 8 spaces like everywhere else in the book. Explain that shared libraries are already covered by ASLR, PIE expands the ASLR to cover the exetutables. In 2022, stack smashing attackings are mostly constructing a sequence of faked returning addresses to exectute a series of function already existing in the programs or libraries itself (ret2lib). Returning into the code injected by the attacker is almost impossible because on i686 (with a PAE/NX enabled kernel) or x86_64, running injected code needs W/X mappings and those are very rare these days. |
||
---|---|---|
.. | ||
binutils-pass1.xml | ||
chapter05.xml | ||
gcc-pass1.xml | ||
glibc.xml | ||
introduction.xml | ||
libstdc++.xml | ||
linux-headers.xml |