Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
SRG-OS-000433-GPOS-00192
SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
An XCCDF Rule
Details
Profiles
Prose
SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
Medium Severity
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware enforced or software enforced, with hardware providing the greater strength of mechanism. Examples of attacks are buffer overflow attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>