>From 9b564f4f2818d276fe71aa3602c166a93d4efa54 Mon Sep 17 00:00:00 2001 From: Shawn Wells <[email protected]> Date: Thu, 27 Sep 2012 23:50:04 -0400 Subject: [PATCH 1/8] Copy-edit of enable_randomize_va_space Quick wording edit of enable_randomize_va_space
--- RHEL6/input/system/permissions/execution.xml | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/RHEL6/input/system/permissions/execution.xml b/RHEL6/input/system/permissions/execution.xml index 0de5df5..c387e1a 100644 --- a/RHEL6/input/system/permissions/execution.xml +++ b/RHEL6/input/system/permissions/execution.xml @@ -136,7 +136,7 @@ address range.</rationale> <ocil><sysctl-check-macro sysctl="kernel.randomize_va_space" value="1" /></ocil> <rationale> Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code he or she has introduced -into a process's address space during an attempt at exploitation. ASLR also +into a process's address space during an attempt at exploitation. Additionally, ASLR also makes it more difficult for an attacker to know the location of existing code in order to re-purpose it using return oriented programming (ROP) techniques. </rationale> -- 1.7.1
_______________________________________________ scap-security-guide mailing list [email protected] https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
