Skip to content

GitHub Blog Search

Search Results for: GitHub Pages

An illustration of two octocats repairing a robot.

Lemur Scheme

For his senior project, @crnixon is implementing an R5R5 Scheme interpreter called Lemur Scheme. img http://img.skitch.com/20090206-8qpughp6au9gp3s5y6ub5y9wmd.jpg http://crnixon.github.com/lemur-scheme The blog is hosted using GitHub Pages and promises updates on the status…

Chris Wanstrath
An illustration of two octocats repairing a robot.

RESTful Flex and AIR Apps

The RestfulX Framework is a framework for quickly developing Adobe Flex and AIR applications. The project makes great use of GitHub Pages and the Wiki. ![](http://img.skitch.com/20090121-ghhyt5cme213x7121u6agqbhak.png) From the site: If…

Chris Wanstrath
Gaining kernel code execution on an MTE-enabled Pixel 8

Gaining kernel code execution on an MTE-enabled Pixel 8

In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this vulnerability can be exploited even when Memory Tagging Extension (MTE), a powerful mitigation, is enabled on the device.

Man Yue Mo
Introduction to SELinux

Introduction to SELinux

SELinux is the most popular Linux Security Module used to isolate and protect system components from one another. Learn about different access control systems and Linux security as I introduce the foundations of a popular type system.

Kevin Stubbings
Crafting a better, faster code view

Crafting a better, faster code view

The new GitHub Code View brings users many new features to improve the code reading and exploration experiences, and we overcame a number of unique technical hurdles in order to deliver those features without compromising performance.

Joshua Brown
Rooting with root cause: finding a variant of a Project Zero bug

Rooting with root cause: finding a variant of a Project Zero bug

In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain on an Android phone that uses the Arm Mali GPU. I’ll also explain how root cause analysis of CVE-2022-36449 led to the discovery of CVE-2022-46395.

Man Yue Mo
Graphic image showing GitHub logo centered within a box to represent padding, to the right is a subsection of a color chart to represent color systems and color contrast, to the left is the letter A in uppercase and lower case to represent typography. Parts of the image are blurred and in focus with a color gradient is used in the background and through the logo in purple, with hints of blue and green.

Design’s journey towards accessibility

Design can have a significant impact on delivering accessible experiences to our users. It takes a cultural shift, dedicated experts, and permission to make progress over perfection in order to build momentum. We’ve got a long way to go, but we’re starting to see a real shift in our journey to make GitHub a true home for all developers.

Diana Mounter
Pwning Pixel 6 with a leftover patch

Pwning Pixel 6 with a leftover patch

In this post, I’ll look at a security-related change in version r40p0 of the Arm Mali driver that was AWOL in the January update of the Pixel bulletin, where other patches from r40p0 was applied, and how these two lines of changes can be exploited to gain arbitrary kernel code execution and root from a malicious app. This highlights how treacherous it can be when backporting security changes.

Man Yue Mo