Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - G index
The Linux kernel configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK_USER
has multiple definitions:
security/Kconfig.hardening
The configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK_USER:
CONFIG_GCC_PLUGINS && ! CONFIG_CC_HAS_AUTO_VAR_INIT_ZERO
Zero-initialize any structures on the stack containing a __user attribute. This can prevent some classes of uninitialized stack variable exploits and information exposures, like CVE-2013-2141: https://git.kernel.org/linus/b9e146d8eb3b9eca
scripts/gcc-plugins/Kconfig
The configuration item CONFIG_GCC_PLUGIN_STRUCTLEAK_USER:
(none)
Zero-initialize any structures on the stack containing a __user attribute. This can prevent some classes of uninitialized stack variable exploits and information exposures, like CVE-2013-2141: https://git.kernel.org/linus/b9e146d8eb3b9eca
Raw data from LKDDb:
(none)
This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).
The data is retrived from:
Popular queries:
Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - G index
Automatically generated (in year 2025). See also LKDDb sources on GitLab