1. Home
  2. Security Hardening
  3. CIS Debian Linux 7 L1 V1.0.0
  4. Restrict Core Dumps – fs.suid_dumpable

Restrict Core Dumps – fs.suid_dumpable

Details

A core dump is the memory of an executable program. It is generally used to determine why a program aborted. It can also be used to glean confidential information from a core file. The system provides the ability to set a soft limit for core dumps, but this can be overridden by the user. Setting a hard limit on core dumps prevents users from overriding the soft variable. If core dumps are required, consider setting limits for user groups (see limits.conf(5)). In addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from dumping core.

Solution

Add the following line to the /etc/security/limits.conf file. * hard core 0 Add the following line to the /etc/sysctl.conf file. fs.suid_dumpable = 0

Supportive Information

The following resource is also helpful.

This control applies to the following type of system Unix.

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles