SRG-OS-000433-GPOS-00193 Controls

STIG ID Version Title Product
ALMA-09-044900 V1R1 AlmaLinux OS 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
OL07-00-040201 V3R1 The Oracle Linux operating system must implement virtual address space randomization.
OL08-00-010430 V2R3 OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
RHEL-08-010430 V2R2 RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
RHEL-09-212050 V2R3 RHEL 9 must enable mitigations against processor-based vulnerabilities.
RHEL-09-213070 V2R3 RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
SLES-12-030330 V3R2 Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.
SLES-15-010550 V2R3 Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.
UBTU-18-010514 V2R15 The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
UBTU-20-010448 V2R1 The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
UBTU-22-213020 V2R3 Ubuntu 22.04 LTS must implement address space layout randomization to protect its memory from unauthorized code execution.
WN11-00-000145 V2R2 Data Execution Prevention (DEP) must be configured to at least OptOut.