Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38675 | RHEL-06-000308 | SV-50476r2_rule | Low |
Description |
---|
A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers trying to debug problems. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2017-03-01 |
Check Text ( C-46235r2_chk ) |
---|
To verify that core dumps are disabled for all users, run the following command: $ grep core /etc/security/limits.conf /etc/security/limits.d/*.conf The output should be: * hard core 0 If it is not, this is a finding. |
Fix Text (F-43624r1_fix) |
---|
To disable core dumps for all users, add the following line to "/etc/security/limits.conf": * hard core 0 |