GEN003510 - Kernel core dumps must be disabled unless needed - process

Information

Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in Denial of Service by exhausting the available space on the target file system. The kernel core dump process may increase the amount of time a system is unavailable due to a crash. Kernel core dumps can be useful for kernel debugging.

Solution

Disable kdump.
# service kdump stop
# chkconfig kdump off

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-218472r603259_rule, STIG-ID|GEN003510, STIG-Legacy|SV-64421, STIG-Legacy|V-22404, Vuln-ID|V-218472

Plugin: Unix

Control ID: ad32da0a7f358e77b65191b2aa15e9553d5bfbf9d2afd9b48a970a9febc3fc4b