[PATCH] ext3 avoid writing kernel memory to disk
From: Marc-Christian Petersen <m.c.p@kernel.linux-systeme.com> Solar Designer discovered an information leak in the ext3 code of Linux. In a worst case an attacker could read sensitive data such as cryptographic keys which would otherwise never hit disk media. Theodore Ts'o developed a correction for this.
Showing
Please register or sign in to comment