Information
This change disables core dumps in the default user stanza of /etc/security/limits and also ensures the fullcore kernel parameter is set to false.
Rationale:
The creation of core dumps can reveal pertinent system information, potentially even passwords, within the core file. The ability to create a core dump is also a vulnerability to be exploited by a hacker.
The commands below disable core dumps by default, but they may be specifically enabled for a particular user in /etc/security/limits.
Solution
Change the default user stanza attributes core and core_hard in /etc/security/limits and then set the fullcore kernel parameter to false:
chsec -f /etc/security/limits -s default -a core=0 -a core_hard=0
chdev -l sys0 -a fullcore=false
Default Value:
Core dumps enabled