3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_PATTERN is set to /var/cores/core_%n_%f_%u_%g_%t_%p

Information

The action described in this section creates a protected directory to store core dumps and also causes the system to create a log entry whenever a regular process dumps core.

Solution

To restrict core files to a protected directory, run the following commands-
mkdir -p /var/cores
chown root:root /var/cores
chmod 700 /var/cores
coreadm -g /var/cores/core_%n_%f_%u_%g_%t_%p -e log -e global -e global-setid -d process -d proc-setid

If the local site chooses, dumping of core files can be completely disabled with the following command-
coreadm -d global -d global-setid -d process -d proc-setid

See Also

https://workbench.cisecurity.org/files/614

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10)

Plugin: Unix

Control ID: ebed7c9b6ca4c6f2feff3393794fb7811b854c1aee0f3880c5c6e0046b60f87d