1.5.5 Ensure the storing of core dumps is disabled

Information

The operating system must disable the kernel.core_pattern.

It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors.

Solution

Configure the operating system to disable the storing core dumps by adding the following line to a file in the "/etc/sysctl.d" directory:

kernel.core_pattern = |/bin/false

Remove any configurations that conflict with the above from the following locations:/run/sysctl.d/ .conf/usr/local/lib/sysctl.d/ .conf/usr/lib/sysctl.d/ .conf/lib/sysctl.d/ .conf/etc/sysctl.conf/etc/sysctl.d/*.conf

The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:

# sysctl --system

See Also

https://workbench.cisecurity.org/benchmarks/19886