[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-95092-3

Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04Date: (C)2020-10-15   (M)2023-12-20



A core dump is the memory of an executable program. It is generally used to determine why a program aborted. It can also be used to glean confidential information from a core file. The system provides the ability to set a soft limit for core dumps, but this can be overridden by the user. Rationale: Setting a hard limit on core dumps prevents users from overriding the soft variable. If core dumps are required, consider setting limits for user groups (see limits.conf(5)). In addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from dumping core. The apport service if active will override the fs.suid_dumpable variable setting and automatically create core dump reports. The whoopsie service monitors apport core dump reports and transmits them to Canonical. Fix: Add the following line to the /etc/default/apport file. enabled=1 Add the following line to the /etc/security/limits.conf file. * hard core 0 Add the following line to the /etc/sysctl.conf file and run sysctl -p command. fs.suid_dumpable = 0 Uninstall the apport and whoopsie packages or comment out any start lines in /etc/init/apport.conf and /etc/init/whoopsie.conf files: # start on runlevel [2345]


Parameter:

[no/yes]


Technical Mechanism:

Add the following line to the /etc/default/apport file enabled=1 Add the following line to the /etc/security/limits.conf file. * hard core 0 Add the following line to the /etc/sysctl.conf file. fs.suid_dumpable = 0 Uninstall the apport and whoopsie packages or comment out any start lines in /etc/init/apport.conf and /etc/init/whoopsie.conf files: # start on runlevel [2345]

CCSS Severity:CCSS Metrics:
CCSS Score : 6.2Attack Vector: LOCAL
Exploit Score: 2.5Attack Complexity: LOW
Impact Score: 3.6Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: NONE
 Availability: NONE
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:65911
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:85165
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:87273
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:92274


OVAL    4
oval:org.secpod.oval:def:65911
oval:org.secpod.oval:def:87273
oval:org.secpod.oval:def:92274
oval:org.secpod.oval:def:85165
...
XCCDF    8
xccdf_org.secpod_benchmark_NIST_800_53_r5_Debain_11
xccdf_org.secpod_benchmark_general_Ubuntu_23.04
xccdf_org.secpod_benchmark_NIST_800_53_r5_Debian_11
xccdf_org.secpod_benchmark_general_Ubuntu_22.04
...

© SecPod Technologies