Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
SRG-OS-000433-GPOS-00193
Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
An XCCDF Rule
Details
Profiles
Prose
Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
Medium Severity
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware enforced or software enforced, with hardware providing the greater strength of mechanism. Examples of attacks are buffer overflow attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>