Address Space Layout Randomization (ASLR) must be enabled.
An XCCDF Rule
Description
<VulnDiscussion>Modification of memory area can result in executable code vulnerabilities. ASLR can reduce the likelihood of these attacks. ASLR activates the randomization of key areas of the process such as stack, brk-based heap, memory mappings, and so forth.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-216444r603267_rule
- Severity
- Low
- References
- Updated
Remediation - Manual Procedure
The root role is required.
This action applies to the global zone only. Determine the zone that you are currently securing.
# zonename