8000 Update SecurityExploits/Chrome/v8/CVE_2023_4069/README.md · github/securitylab@5cc588a · GitHub
[go: up one dir, main page]

Skip to content

Commit 5cc588a

Browse files
Update SecurityExploits/Chrome/v8/CVE_2023_4069/README.md
Co-authored-by: Kevin Backhouse <kevinbackhouse@github.com>
1 parent f956ca4 commit 5cc588a

File tree

1 file changed

+1
-1
lines changed
  • SecurityExploits/Chrome/v8/CVE_2023_4069

1 file changed

+1
-1
lines changed

SecurityExploits/Chrome/v8/CVE_2023_4069/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
The analysis of this bug can be found [here]( https://github.blog/2023-10-17-getting-rce-in-chrome-with-incomplete-object-initialization-in-the-maglev-compiler).
44

5-
The exploit here is tested on `v8` version 11.5.150.16, which is the version shipped with Chrome 115.0.5790.98/99, the one before the bug is fixed, on Ubuntu 22.04. I have not tested it on Chrome itself.
5+
The exploit here is tested on `v8` version 11.5.150.16, which is the version shipped with Chrome 115.0.5790.98/99, the one before the bug was fixed, on Ubuntu 22.04. I have not tested it on Chrome itself.
66

77
To test, check out `v8` at version 11.5.150.16 and compile with the default settings using `tools/dev/gm.py x64.release`. Then open the file `poc.js` with `d8` with the `maglev` flag (Chrome would have enabled this flag already):
88

0 commit comments

Comments
 (0)
0