The system must be configured to store any process core dumps in a specific, centralized directory.

From SUSE Linux Enterprise Server v11 for System z

Part of GEN003501

Associated with: CCI-000225

SV-46151r1_rule The system must be configured to store any process core dumps in a specific, centralized directory.

Vulnerability discussion

Specifying a centralized location for core file creation allows for the centralized protection of core files. Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If process core dump creation is not configured to use a centralized directory, core dumps may be created in a directory that does not have appropriate ownership or permissions configured, which could result in unauthorized access to the core dumps.

Check content

Verify a directory is defined for process core dumps. # cat /proc/sys/kernel/core_pattern If the parameter is not an absolute path (does not start with a slash [/]), this is a finding.

Fix text

Edit /etc/sysctl.conf and set (adding if necessary) kernel.core_pattern to an absolute path ending with a file name prefix, such as "/var/core/core".

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer