Details
Randomly placing virtual memory regions will make it difficult to write memory page exploits as the memory placement will be consistently shifting.
Solution
Set the following parameter in the /etc/sysctl.conf file-kernel.randomize_va_space = 2Run the following command to set the active kernel parameter – # sysctl -w kernel.randomize_va_space=2
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Information Integrity.This control applies to the following type of system Unix.