handouts/ho03.tex
changeset 467 da4896f201b5
parent 461 57108918cf8c
child 468 e4a2807ac7f2
equal deleted inserted replaced
466:ddf7315450c9 467:da4896f201b5
    66 recently (February 2016) a buffer overflow attack was discovered in the glibc
    66 recently (February 2016) a buffer overflow attack was discovered in the glibc
    67 library:\footnote{\url{http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/}}
    67 library:\footnote{\url{http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/}}
    68 
    68 
    69 \begin{quote}\it
    69 \begin{quote}\it
    70 ``Since 2008, vulnerability has left apps and hardware open to remote
    70 ``Since 2008, vulnerability has left apps and hardware open to remote
    71   hijacking. Researchers have discovered a potentially catastrophic flaw in
    71   hijacking: Researchers have discovered a potentially catastrophic flaw in
    72   one of the Internet's core building blocks that leaves hundreds or
    72   one of the Internet's core building blocks that leaves hundreds or
    73   thousands of apps and hardware devices vulnerable to attacks that can take
    73   thousands of apps and hardware devices vulnerable to attacks that can take
    74   complete control over them.  The vulnerability was introduced in 2008 in
    74   complete control over them.  The vulnerability was introduced in 2008 in
    75   GNU C Library, a collection of open source code that powers thousands of
    75   GNU C Library, a collection of open source code that powers thousands of
    76   standalone applications and most distributions of Linux, including those
    76   standalone applications and most distributions of Linux, including those