Information
This change disables core dumps in the default user stanza of /etc/security/limits and also ensures the fullcore kernel parameter is set to false.
The creation of core dumps can reveal pertinent system information, potentially even passwords, within the core file. The ability to create a core dump is also a vulnerability to be exploited by a hacker.
The commands below disable core dumps by default, but they may be specifically enabled for a particular user in /etc/security/limits
Solution
Change the default user stanza attributes core and core_hard in /etc/security/limits and then set the fullcore kernel parameter to false:
chsec -f /etc/security/limits -s default -a core=0 -a core_hard=0
chdev -l sys0 -a fullcore=false