Răsfoiți Sursa

deploy: 84cc7fee1c84611f866fa6ef637967e62b220139

jserv 9 luni în urmă
părinte
comite
cae871dbaf
2 a modificat fișierele cu 4 adăugiri și 4 ștergeri
  1. 2 2
      index.html
  2. 2 2
      lkmpg-for-ht.html

+ 2 - 2
index.html

@@ -18,7 +18,7 @@
 
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
-<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
+<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
                                                                   
 
                                                                   
@@ -4765,7 +4765,7 @@ to improve memory safety. A buffer overflow in the area of a
 </code> structure may be able to overwrite the
 <code> <span class='ectt-1000'>function</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
-</code> fields, providing the attacker with a way to use return-object programming (ROP)
+</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype

+ 2 - 2
lkmpg-for-ht.html

@@ -18,7 +18,7 @@
 
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
-<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
+<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
                                                                   
 
                                                                   
@@ -4765,7 +4765,7 @@ to improve memory safety. A buffer overflow in the area of a
 </code> structure may be able to overwrite the
 <code> <span class='ectt-1000'>function</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
-</code> fields, providing the attacker with a way to use return-object programming (ROP)
+</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype