The software described in this documentation is either in Extended Support or Sustaining Support. See https://www.oracle.com/us/support/library/enterprise-linux-support-policies-069172.pdf for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.
        Core dumps can contain information that an attacker might be
        able to exploit and they take up a large amount of disk space.
        To prevent the system creating core dumps when the operating
        system terminates a program due to a segment violation or other
        unexpected error, add the following line to
        /etc/security/limits.conf:
* hard core 0
        You can restrict access to core dumps to certain users or
        groups, as described in the limits.conf(5)
        manual page.
      
        By default, the system prevents setuid and
        setgid programs, programs that have changed
        credentials, and programs whose binaries do not have read
        permission from dumping core. To ensure that the setting is
        permanently recorded, add the following lines to
        /etc/sysctl.conf:
# Disallow core dumping by setuid and setgid programs fs.suid_dumpable = 0
and then run the sysctl -p command.
          A value of 1 permits core dumps that are readable by the owner
          of the dumping process. A value of 2 permits core dumps that
          are readable only by root for debugging
          purposes.
        

