1. Home
  2. Security Hardening
  3. CIS Solaris 11.2 L1 V1.1.0
  4. Restrict Core Dumps to Protected Directory – per-process setid core dumps = disabled

Restrict Core Dumps to Protected Directory – per-process setid core dumps = disabled

Details

The action described in this section creates a protected directory to store core dumps and

also causes the system to create a log entry whenever a regular process dumps core.

Core dumps, particularly those from set-UID and set-GID processes, may contain sensitive

data.

Solution

To implement the recommendation, run the commands-# chmod 700 /var/share/cores
# coreadm -g /var/share/cores/core_%n_%f_%u_%g_%t_%p
-e log -e global -e global-setid
-d process -d proc-setidIf the local site chooses, dumping of core files can be completely disabled with the following
command-# coreadm -d global -d global-setid -d process -d proc-setid

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles