RHEL 9 must disable acquiring, saving, and processing core dumps.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-257815 | RHEL-09-213100 | SV-257815r991589_rule | CCI-000366 | medium |
| Description | ||||
| A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers trying to debug problems. | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 9 Security Technical Implementation Guide | 2025-05-14 | |||
Details
Check Text (C-257815r991589_chk)
Verify RHEL 9 is not configured to acquire, save, or process core dumps with the following command:
$ sudo systemctl status systemd-coredump.socket
systemd-coredump.socket
Loaded: masked (Reason: Unit systemd-coredump.socket is masked.)
Active: inactive (dead)
If the "systemd-coredump.socket" is loaded and not masked and the need for core dumps is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding.
Fix Text (F-61480r925431_fix)
Configure the system to disable the systemd-coredump.socket with the following command:
$ sudo systemctl mask --now systemd-coredump.socket
Created symlink /etc/systemd/system/systemd-coredump.socket -> /dev/null
Reload the daemon for this change to take effect.
$ sudo systemctl daemon-reload