diff options
author | Kees Cook <keescook@chromium.org> | 2016-05-18 06:37:47 -0700 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2016-06-09 13:23:27 -0600 |
commit | c9de4a82c852d621975f5978157f689e0550a48e (patch) | |
tree | 19cb2212c8ec79999357462149ed98354a51aacb /scripts | |
parent | 6d5244c72ec9cfff1390152ef7cc8540af0f2748 (diff) | |
download | op-kernel-dev-c9de4a82c852d621975f5978157f689e0550a48e.zip op-kernel-dev-c9de4a82c852d621975f5978157f689e0550a48e.tar.gz |
docs: self-protection: rename "leak" to "exposure"
The meaning of "leak" can be both "untracked resource allocation" and
"memory content disclosure". This document's use was entirely of the
latter meaning, so avoid the confusion by using the Common Weakness
Enumeration name for this: Information Exposure (CWE-200). Additionally
adds a section on structure randomization.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions