Pārlūkot izejas kodu

deploy: 84cc7fee1c84611f866fa6ef637967e62b220139

jserv 9 mēneši atpakaļ
vecāks
revīzija
cae871dbaf
2 mainītis faili ar 4 papildinājumiem un 4 dzēšanām
  1. 2 2
      index.html
  2. 2 2
      lkmpg-for-ht.html

+ 2 - 2
index.html

@@ -18,7 +18,7 @@
 
 
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
-<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
+<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
                                                                   
                                                                   
 
 
                                                                   
                                                                   
@@ -4765,7 +4765,7 @@ to improve memory safety. A buffer overflow in the area of a
 </code> structure may be able to overwrite the
 </code> structure may be able to overwrite the
 <code> <span class='ectt-1000'>function</span>
 <code> <span class='ectt-1000'>function</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
-</code> fields, providing the attacker with a way to use return-object programming (ROP)
+</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype

+ 2 - 2
lkmpg-for-ht.html

@@ -18,7 +18,7 @@
 
 
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
 <div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
-<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
+<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
                                                                   
                                                                   
 
 
                                                                   
                                                                   
@@ -4765,7 +4765,7 @@ to improve memory safety. A buffer overflow in the area of a
 </code> structure may be able to overwrite the
 </code> structure may be able to overwrite the
 <code> <span class='ectt-1000'>function</span>
 <code> <span class='ectt-1000'>function</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
 </code> and <code>  <span class='ectt-1000'>data</span>
-</code> fields, providing the attacker with a way to use return-object programming (ROP)
+</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 to call arbitrary functions within the kernel. Also, the function prototype of the callback,
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 containing a <code>  <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype
 </code> argument, will prevent work from any type checking. Furthermore, the function prototype