STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-281322

CAT II (Medium)

RHEL 10 must disable the kdump service.

Rule ID

SV-281322r1167116_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001665

Discussion

Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps consume a considerable amount of disk space and may result in denial of service by exhausting the available space on the target file system partition. Unless the system is used for kernel development or testing, there is little need to run the kdump service.

Check Content

Verify RHEL 10 disables the kdump service in system boot configuration with the following command:

$ sudo systemctl is-enabled  kdump
masked

Verify the kdump service is not active (i.e., not running) through current runtime configuration with the following command:

$ sudo systemctl is-active kdump
failed

Verify the kdump service is masked with the following command:

$ sudo systemctl show  kdump  | grep "LoadState\|UnitFileState"
LoadState=masked
UnitFileState=masked

If the "kdump" service is loaded or active and is not masked, this is a finding.

Fix Text

Configure RHEL 10 to disable and mask the kdump service.

To disable the kdump service, run the following command:

$ sudo systemctl disable --now kdump
Removed '/etc/systemd/system/multi-user.target.wants/kdump.service'.

To mask the kdump service, run the following command:

$ sudo systemctl mask --now kdump
Created symlink '/etc/systemd/system/kdump.service' ? '/dev/null'.