"Strong" stack protection for GCC
"Strong" stack protection for GCC
Posted Feb 7, 2014 4:08 UTC (Fri) by jtc (guest, #6246)Parent article: "Strong" stack protection for GCC
"Generally, stack buffer overflow (aka "stack smashing") attacks will have to change the value of the canary as they write beyond the end of the buffer before they can get to the return pointer."
Does the word 'generally' imply that there are some cases where this is not true (i.e., canary value does not have to be changed)? I suspect not. And if the answer is no, I believe the meaning of the sentence would be clearer without the introductory 'Generally, '.
