RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

ExecShield uses the segmentation feature on all x86 systems to prevent execution in memory higher than a certain address. It writes an address as a limit in the code segment descriptor, to control where code can be executed, on a per-process basis. When the kernel places a process's memory regions such as the stack and heap higher than this address, the hardware prevents execution in that address range. This is enabled by default on the latest Red Hat and Fedora systems if supported by the hardware.

Solution

Update the GRUB 2 bootloader configuration.

Run the following command:

$ sudo grubby --update-kernel=ALL --remove-args=noexec

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/U_RHEL_9_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002824, Rule-ID|SV-257817r925438_rule, STIG-ID|RHEL-09-213110, Vuln-ID|V-257817

Plugin: Unix

Control ID: f31a64fbc79778227ff1f14f7e7bdb3fa92b44d869a736bfe41f289791142cb4