On Mon, Mar 11, 2013 at 12:25:19PM -0700, Kees Cook wrote:
> Masks kernel address info-leak in object dumps with the %pK suffix,
> so they cannot be used to target kernel memory corruption attacks if
> the kptr_restrict sysctl is set.
>
> Signed-off-by: Kees Cook
> Cc: sta...@vger.kernel.org
Masks kernel address info-leak in object dumps with the %pK suffix,
so they cannot be used to target kernel memory corruption attacks if
the kptr_restrict sysctl is set.
Signed-off-by: Kees Cook
Cc: sta...@vger.kernel.org
---
drivers/gpu/drm/i915/i915_debugfs.c |2 +-
1 file changed, 1
Masks kernel address info-leak in object dumps with the %pK suffix,
so they cannot be used to target kernel memory corruption attacks if
the kptr_restrict sysctl is set.
Signed-off-by: Kees Cook keesc...@chromium.org
Cc: sta...@vger.kernel.org
---
drivers/gpu/drm/i915/i915_debugfs.c |2 +-
1
On Mon, Mar 11, 2013 at 12:25:19PM -0700, Kees Cook wrote:
Masks kernel address info-leak in object dumps with the %pK suffix,
so they cannot be used to target kernel memory corruption attacks if
the kptr_restrict sysctl is set.
Signed-off-by: Kees Cook keesc...@chromium.org
Cc:
4 matches
Mail list logo