From b00c7d9905aaf0ae3a6cc2cb19f2bc02057e640f Mon Sep 17 00:00:00 2001 From: Pierre Labastie Date: Tue, 18 Oct 2022 09:59:00 +0200 Subject: Clarify why pie might be disabled Just reading a textbook and LFS does not imply anything for compilation... --- chapter01/whatsnew.xml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'chapter01/whatsnew.xml') diff --git a/chapter01/whatsnew.xml b/chapter01/whatsnew.xml index b36765261..5d246c861 100644 --- a/chapter01/whatsnew.xml +++ b/chapter01/whatsnew.xml @@ -14,10 +14,10 @@ In the 11.3 release, --enable-default-pie and --enable-default-ssp are enabled for GCC. These techniques can mitigate some malicious attacks, but they do not provide - perfect security. If you are reading LFS and a programming textbook, + perfect security. Note that some textbooks assume these options are + disabled, so that if you run examples from such a textbook on an LFS system, you may need to disable PIE and SSP with the GCC options - -fno-pie -no-pie -fno-stack-protection, - because some textbooks assume these options are disabled by default. + -fno-pie -no-pie -fno-stack-protection. Here is a list of the packages updated since the previous release of LFS. -- cgit v1.2.3-54-g00ecf