Skip to content

Address Space Layout Randomization (ASLR) must be enabled.

An XCCDF Rule

Description

<VulnDiscussion>Modification of memory area can result in executable code vulnerabilities. ASLR can reduce the likelihood of these attacks. ASLR activates the randomization of key areas of the process such as stack, brk-based heap, memory mappings, and so forth.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-216207r603268_rule
Severity
Low
References
Updated



Remediation - Manual Procedure

The root role is required.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename