Skip to content

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
    • Help
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
Sortix
Sortix
  • Project
    • Project
    • Details
    • Activity
    • Releases
    • Cycle Analytics
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Charts
    • Locked Files
  • Issues 412
    • Issues 412
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 2
    • Merge Requests 2
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Charts
  • Create a new issue
  • Commits
  • Issue Boards
  • sortix
  • SortixSortix
  • Issues
  • #692

Closed
Open
Opened Jan 05, 2018 by heat@PedroFalcato
  • Report abuse
  • New issue
Report abuse New issue

Randomize the stack canary

Right now the stack canary is hardcoded, which effectively makes the kernel vulnerable to buffer overflows since it's rather easy to go around it when the canary's value is known. Randomize it at boot and at program load.

Related issues

Assignee
Assign to
Sortix 1.2
Milestone
Sortix 1.2
Assign milestone
Time tracking
None
Due date
No due date
4
Labels
kernel libc security userspace
Assign labels
  • View project labels
Reference: sortix/sortix#692