CCE-95064-2Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04 | Date: (C)2020-10-15 (M)2023-09-01 |
Set the system flag to force randomized virtual memory region placement.
Disabled = No ASLR (Memory address would not be randomizaed)
Conservative Randomization == Randomize addresses for Stack, Heap, Shared Libs, PIE, mmap(), VDRO
Full Randomization = Conservative Randomization + memory managed via brk()
Rationale:
Randomly placing virtual memory regions will make it difficult to write memory page exploits as the memory placement will be consistently shifting.
Fix:
Add the following line to the /etc/sysctl.conf file and run sysctl -p command.
kernel.randomize_va_space = 2
Parameter:
[Disabled/Conservative Randomization/Full Randomization]
Technical Mechanism:
Add the following line to the /etc/sysctl.conf file.
kernel.randomize_va_space = 2
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.2 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 3.6 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: NONE |
| Availability: NONE |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:65912 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92243 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:85140 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:87274 |