GEN003500 - Process core dumps must be disabled unless needed.

Information

Process core dumps contain the memory in use by the process when it crashed. Process core dump files can be of significant size and their use can result in file systems filling to capacity, which may result in Denial of Service. Process core dumps can be useful for software debugging.

Solution

Edit /etc/security/limits.conf and set a hard limit for 'core' to 0 for all users. A new logon will be required for the changes to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-218471r603259_rule, STIG-ID|GEN003500, STIG-Legacy|SV-64311, STIG-Legacy|V-11996, Vuln-ID|V-218471

Plugin: Unix

Control ID: 42cb1867da534e7094c3341b4a71eae24988ecf6673840b5d568f0d6563b0719