Kees Cook ([email protected])

Number of posts: 250 (0.36 per day)
First post: 2008-10-02 21:51:42
Last post: 2010-08-27 21:45:07

Date List Subject
2011-02-08 22:33:05 linux-kernel Re: [PATCH v2 2/2] man-pages: SYSLOG_ACTION_* constants are now exported
2011-02-08 22:23:38 linux-kernel Re: [PATCH v2 1/2] Export linux/syslog.h
2011-02-08 04:27:16 linux-kernel Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec
2011-02-08 01:14:49 linux-kernel Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec
2011-02-07 23:14:18 linux-kernel [SECURITY] /proc/$pid/ leaks contents across setuid exec
2011-02-05 07:14:34 linux-kernel [PATCH v3] use %pK for /proc/kallsyms and /proc/modules
2011-02-05 05:37:38 linux-kernel Re: [tip:x86/urgent] x86-32: Make sure the stack is set up before we use it
2011-02-05 02:24:46 linux-kernel Re: [tip:x86/urgent] x86-32: Make sure the stack is set up before we use it
2011-02-04 22:10:03 linux-kernel Re: [PATCH v2] use %pK for /proc/kallsyms and /proc/modules
2011-02-02 20:40:46 linux-kernel Re: [BUG] broken ebba638ae723d8a8fc2f7abce5ec18b688b791d7
2010-12-18 18:28:44 linux-kernel Re: [PATCH v3] kptr_restrict for hiding kernel pointers
2010-12-11 23:15:57 linux-kernel Re: [PATCH 3/3 V13] RO/NX protection for loadable kernel
2010-12-11 00:28:40 linux-kernel Re: [PATCH 3/3 V13] RO/NX protection for loadable kernel
2010-12-11 00:12:07 linux-kernel Re: [PATCH v2] kptr_restrict for hiding kernel pointers from unprivileged users
2010-12-08 22:27:43 linux-kernel Re: [tip:x86/cpu] x86, cpu: Clear XD_DISABLED flag on Intel to regain NX
2010-12-08 22:21:14 linux-kernel Re: [PATCH 3/3 V13] RO/NX protection for loadable kernel
2010-12-08 17:53:39 linux-kernel Re: [PATCH] syslog: check cap_syslog when dmesg_restrict
2010-11-20 03:20:14 linux-kernel Re: [PATCH] kernel: make /proc/kallsyms mode 400 to reduce ease of attacking
2010-11-20 02:41:10 linux-kernel Re: [PATCH] kernel: make /proc/kallsyms mode 400 to reduce ease of attacking
2010-11-18 20:09:17 linux-kernel Re: [PATCH] capabilities/syslog: open code cap_syslog logic to fix build failure
2010-11-18 14:07:09 linux-kernel [tip:x86/cpu] x86: Fix included-by file reference comments
2010-11-17 22:14:50 linux-kernel Re: [Security] proactive defense: using read-only memory
2010-11-16 20:52:48 linux-kernel Re: [PATCH] ipc: explicitly clear stack memory for shminfo
2010-11-16 19:58:45 linux-kernel [PATCH] ipc: explicitly clear stack memory for shminfo
2010-11-16 18:11:11 linux-kernel [PATCH] x86: fix included-by file reference comments
2010-11-16 15:55:21 linux-kernel Re: [PATCH] capabilities/syslog: open code cap_syslog logic to fix build failure
2010-11-14 03:05:51 linux-kernel Re: [PATCH] Fix dmesg_restrict build failure with CONFIG_EMBEDDED=y and CONFIG_PRINTK=n
2010-11-14 02:45:38 linux-kernel Re: [PATCH] Fix dmesg_restrict build failure with CONFIG_EMBEDDED=y and CONFIG_PRINTK=n
2010-11-11 06:58:04 linux-kernel Re: [Security] proactive defense: using read-only memory, RO/NX modules
2010-11-10 18:37:32 linux-kernel [PATCH 2/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-10 18:37:23 linux-kernel [PATCH 3/4] x86: call verify_cpu during 32bit CPU startup
2010-11-10 18:37:18 linux-kernel [PATCH 4/4] x86: only CPU features determine NX capabilities
2010-11-10 18:37:09 linux-kernel [Security] [PATCH v5 0/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-10 18:37:08 linux-kernel [PATCH 1/4] x86: rename verify_cpu_64.S to verify_cpu.S
2010-11-10 18:15:18 linux-kernel Re: [PATCH 2/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-10 16:47:15 linux-kernel Re: [PATCH 2/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-10 16:32:56 linux-kernel Re: [PATCH v2] Restrict unprivileged access to kernel syslog
2010-11-10 02:00:36 linux-kernel Re: [PATCH] ipc: explicitly clear stack memory in user structs
2010-11-10 01:12:06 linux-kernel Re: [Security] [PATCH v3 0/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-10 00:43:58 linux-kernel Re: [Security] [PATCH v3 0/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-09 23:53:23 linux-kernel Re: [Security] [PATCH v3 0/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-09 23:49:38 linux-kernel Re: [PATCH] ipc: explicitly clear stack memory in user structs
2010-11-09 22:19:08 linux-kernel [PATCH 4/4] x86: only CPU features determine NX capabilities
2010-11-09 22:18:45 linux-kernel [PATCH 3/4] x86: call verify_cpu during 32bit CPU startup
2010-11-09 22:18:23 linux-kernel [PATCH 2/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-09 22:17:52 linux-kernel [PATCH 1/4] x86: rename verify_cpu_64.S to verify_cpu.S
2010-11-09 22:17:12 linux-kernel [Security] [PATCH v4 0/4] x86: clear XD_DISABLED flag on Intel to regain NX
2010-11-09 21:49:45 linux-kernel Re: [PATCH] ipc: explicitly clear stack memory in user structs
2010-11-09 20:50:49 linux-kernel Re: [PATCH] ipc: explicitly clear stack memory in user structs
2010-11-09 20:49:00 linux-kernel Re: [PATCH 3/4] x86: call verify_cpu during 32bit CPU startup
2010-11-09 19:56:25 linux-kernel Re: [PATCH 3/4] x86: call verify_cpu during 32bit CPU startup