1.5.5 Ensure kernel core dumps are disabled.

Information

The operating system must disable Kernel core dumps unless needed.

Rationale:

Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service by exhausting the available space on the target file system partition.

Solution

If kernel core dumps are not required, disable the kdump service with the following command:

# systemctl disable kdump.service

If kernel core dumps are required, document the need with the Authorizing Official.

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72057

Rule ID: SV-86681r2_rule

STIG ID: RHEL-07-021300

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CSCv7|5.1

Plugin: Unix

Control ID: 501ac3a9e7c0f5a73fa17c1452cb992996d9fe6e7d04a3b535e21e097c7f8750