1.5.1 Ensure core dumps are restricted - fs.suid_dump = 0

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting a hard limit on core dumps prevents users from overriding the soft variable. If core dumps are required, consider setting limits for user groups (see limits.conf(5)). In
addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from dumping core.

Solution

Add the following line to the /etc/security/limits.conf file or a /etc/security/limits.d/* file-* hard core 0Set the following parameter in the /etc/sysctl.conf file-fs.suid_dumpable = 0Run the following command to set the active kernel parameter - # sysctl -w fs.suid_dumpable=0

See Also

https://benchmarks.cisecurity.org/tools2/linux/CIS_Amazon_Linux_Benchmark_v2.0.0.pdf

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: Unix

Control ID: 181437b59051c2e99c54c40c52a9287394870acc29670321dc2e08ae05d344a3