1.6.3 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.d

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Address space layout randomization (ASLR) is an exploit mitigation technique which randomly arranges the address space of key data areas of a process.

Rationale:

Randomly placing virtual memory regions will make it difficult to write memory page exploits as the memory placement will be consistently shifting.

Solution

Set the following parameter in /etc/sysctl.conf or a /etc/sysctl.d/* file:

kernel.randomize_va_space = 2

Run the following command to set the active kernel parameter:

# sysctl -w kernel.randomize_va_space=2

See Also

https://workbench.cisecurity.org/files/2851

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CCE|CCE-27099-1, CSCv6|3.1

Plugin: Unix

Control ID: ce82393dc6cbd17c16b214cff242ad470fc7f5551391ee4d3ad1040f7176deb1