The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-256535SRG-OS-000433-GPOS-00193PHTN-30-000065SV-256535r958928_rule2024-12-161
Description
ASLR makes it more difficult for an attacker to predict the location of attack code they have introduced into a process's address space during an attempt at exploitation. ASLR also makes it more difficult for an attacker to know the location of existing code to repurpose it using return-oriented programming (ROP) techniques.
ℹ️ Check
At the command line, run the following command: # cat /proc/sys/kernel/randomize_va_space If the value of "randomize_va_space" is not "2", this is a finding.
✔️ Fix
Navigate to and open: /etc/sysctl.d/50-security-hardening.conf Ensure the "randomize_va_space" is uncommented and set to the following: kernel.randomize_va_space=2 At the command line, run the following command: # sysctl --system