The system must be configured to store any process core dumps in a specific, centralized directory.

From SOLARIS 10 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE

Part of GEN003501

Associated with IA controls: ECLP-1

Associated with: CCI-000225

SV-26576r2_rule The system must be configured to store any process core dumps in a specific, centralized directory.

Vulnerability discussion

Specifying a centralized location for core file creation allows for the centralized protection of core files. Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If process core dump creation is not configured to use a centralized directory, core dumps may be created in a directory that does not have appropriate ownership or permissions configured, which could result in unauthorized access to the core dumps.

Check content

Verify a directory is defined for process core dumps. # grep COREADM_GLOB_PATTERN /etc/coreadm.conf If the parameter is not an absolute path (does not start with a slash [/]), this is a finding.

Fix text

Change the core file pattern. # coreadm -g /var/core/core.%f.%p Then: # coreadm -u In order to force a reload of the configuration.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer