The Photon operating system must restrict core dumps.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-258904 | PHTN-40-000246 | SV-258904r933773_rule | CCI-000366 | medium |
| Description | ||||
| By enabling the fs.suid_dumpable kernel parameter, core dumps are not generated for setuid or otherwise protected/tainted binaries. This prevents users from potentially accessing core dumps with privileged information they would otherwise not have access to read. | ||||
| STIG | Date | |||
| VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide | 2023-10-29 | |||
Details
Check Text (C-258904r933773_chk)
At the command line, run the following command to verify core dumps are restricted:
# /sbin/sysctl fs.suid_dumpable
Example result:
fs.suid_dumpable = 0
If the "fs.suid_dumpable" kernel parameter is not set to "0", this is a finding.
Fix Text (F-62553r933772_fix)
Navigate to and open:
/etc/sysctl.d/zz-stig-hardening.conf
Add or update the following line:
fs.suid_dumpable = 0
At the command line, run the following command to load the new configuration:
# /sbin/sysctl --load /etc/sysctl.d/zz-stig-hardening.conf
Note: If the file zz-stig-hardening.conf does not exist, it must be created.