1.5.1 Ensure core dumps are restricted - /sbin/sysctl fs.suid_dumpable

Information

A core dump is the memory of an executable program. It is generally used to determine why a program aborted. It can also be used to glean confidential information from a core file. The system provides the ability to set a soft limit for core dumps, but this can be overridden by the user. Setting a hard limit on core dumps prevents users from overriding the soft variable. If core dumps are required, consider setting limits for user groups (see limits.conf(5)). In addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from dumping core.

Solution

Add the following line to /etc/security/limits.conf or a /etc/security/limits.d/* file: * hard core 0
Set the following parameter in /etc/sysctl.conf or a /etc/sysctl.d/* file: fs.suid_dumpable = 0
Run the following command to set the active kernel parameter: # sysctl -w fs.suid_dumpable=0

See Also

https://workbench.cisecurity.org/files/1865

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: Unix

Control ID: e187c78221ace74543a0cb832eb7763e0939b2a7075188ae61756b0ab130cec4