aboutsummaryrefslogtreecommitdiffstats
path: root/chapter08
diff options
context:
space:
mode:
Diffstat (limited to 'chapter08')
-rw-r--r--chapter08/gcc.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/chapter08/gcc.xml b/chapter08/gcc.xml
index c5c446e9a..a36720374 100644
--- a/chapter08/gcc.xml
+++ b/chapter08/gcc.xml
@@ -112,7 +112,7 @@ cd build</userinput></screen>
PIE (position-independent executable) is a technique to produce
binary programs that can be loaded anywhere in memory. Without PIE,
the security feature named ASLR (Address Space Layout Randomization)
- can be applied for the shared libraries, but not the exectutable
+ can be applied for the shared libraries, but not the executable
itself. Enabling PIE allows ASLR for the executables in addition to
the shared libraries, and mitigates some attacks based on fixed
addresses of sensitive code or data in the executables.