UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Process core dumps must be disabled unless needed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38675 RHEL-06-000308 SV-50476r2_rule Low
Description
A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers trying to debug problems.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2018-11-28

Details

Check Text ( C-46235r2_chk )
To verify that core dumps are disabled for all users, run the following command:

$ grep core /etc/security/limits.conf /etc/security/limits.d/*.conf

The output should be:

* hard core 0

If it is not, this is a finding.
Fix Text (F-43624r1_fix)
To disable core dumps for all users, add the following line to "/etc/security/limits.conf":

* hard core 0