1.5.3 Ensure address space layout randomization (ASLR) is enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Address space layout randomization (ASLR) is an exploit mitigation technique which randomly arranges the address space of key data areas of a process. Randomly placing virtual memory regions will make it difficult to write memory page exploits as the memory placement will be consistently shifting.

Solution

Set the following parameter in the /etc/sysctl.conf file: kernel.randomize_va_space = 2 Run the following command to set the active kernel parameter: # sysctl -w kernel.randomize_va_space=2

See Also

https://benchmarks.cisecurity.org/tools2/linux/CIS_Ubuntu_Linux_14.04_LTS_Benchmark_v2.0.0.pdf

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CSCv6|3.1

Plugin: Unix

Control ID: be2e5cf865727f5f4515e7ef5d972260ddbbc704fb73040ef4e7fe205408874e