Compiler

Audit Installed Compilers and Their Packages

Compilers can be abused by attackers to perform the so-called privilege escalation attacks. Here is how to find compilers and secure your system.

Summary

Compilers and security

Compilers can be the gateway for an attacker. By misusing a possible weakness in your system(s), a compiler is often used to build the related exploit code. One way to prevent this is to determine what compilers are installed and remove (or restrict) them.

Comparing Installed Packages and Compilers

One way to audit the system is creating a list of common compilers and packages, then match these with the installed packages.