This document provides an overview of kernel pointer leaks that can occur in the Windows kernel. It discusses several ways that kernel addresses can be disclosed through Windows APIs, including module base addresses from NtQuerySystemInformation, kernel object addresses from various tracing and debugging APIs, and physical memory information leaks from the SuperFetch subsystem. The document serves to motivate further hardening of kernel address space layout randomization defenses in Windows.