>From 9b564f4f2818d276fe71aa3602c166a93d4efa54 Mon Sep 17 00:00:00 2001
From: Shawn Wells <[email protected]>
Date: Thu, 27 Sep 2012 23:50:04 -0400
Subject: [PATCH 1/8] Copy-edit of enable_randomize_va_space
 Quick wording edit of enable_randomize_va_space

---
 RHEL6/input/system/permissions/execution.xml |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/RHEL6/input/system/permissions/execution.xml 
b/RHEL6/input/system/permissions/execution.xml
index 0de5df5..c387e1a 100644
--- a/RHEL6/input/system/permissions/execution.xml
+++ b/RHEL6/input/system/permissions/execution.xml
@@ -136,7 +136,7 @@ address range.</rationale>
 <ocil><sysctl-check-macro sysctl="kernel.randomize_va_space" value="1" 
/></ocil>
 <rationale> Address space layout randomization (ASLR) makes it more difficult
 for an attacker to predict the location of attack code he or she has introduced
-into a process's address space during an attempt at exploitation.  ASLR also
+into a process's address space during an attempt at exploitation.  
Additionally, ASLR also
 makes it more difficult for an attacker to know the location of existing code
 in order to re-purpose it using return oriented programming (ROP) techniques.
 </rationale>
-- 
1.7.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to