linux

6 posts

Using CVE-2023-43641 as an example, I’ll explain how to develop an exploit for a memory corruption vulnerability on Linux. The exploit has to bypass several mitigations to achieve code execution. The post Cueing up a calculator: an introduction to exploit development on Linux appeared first on The GitHub Blog.

Kevin Backhouse12/6/2023