equal
deleted
inserted
replaced
66 recently (February 2016) a buffer overflow attack was discovered in the glibc |
66 recently (February 2016) a buffer overflow attack was discovered in the glibc |
67 library:\footnote{\url{http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/}} |
67 library:\footnote{\url{http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/}} |
68 |
68 |
69 \begin{quote}\it |
69 \begin{quote}\it |
70 ``Since 2008, vulnerability has left apps and hardware open to remote |
70 ``Since 2008, vulnerability has left apps and hardware open to remote |
71 hijacking. Researchers have discovered a potentially catastrophic flaw in |
71 hijacking: Researchers have discovered a potentially catastrophic flaw in |
72 one of the Internet's core building blocks that leaves hundreds or |
72 one of the Internet's core building blocks that leaves hundreds or |
73 thousands of apps and hardware devices vulnerable to attacks that can take |
73 thousands of apps and hardware devices vulnerable to attacks that can take |
74 complete control over them. The vulnerability was introduced in 2008 in |
74 complete control over them. The vulnerability was introduced in 2008 in |
75 GNU C Library, a collection of open source code that powers thousands of |
75 GNU C Library, a collection of open source code that powers thousands of |
76 standalone applications and most distributions of Linux, including those |
76 standalone applications and most distributions of Linux, including those |