4 The fs.suid_dumpable kernel parameter is now explicitly set to 0 to prevent
5 exposing sensitive data through core dumps of processes with elevated
6 permissions. Deployments that set or depend on non-zero values for
7 fs.suid_dumpable may be affected by upgrading.
10 Explicitly disable core dump for setuid programs by setting
11 fs.suid_dumpable = 0, this will descrease the risk of unauthorized access
12 of core dump file generated by setuid program.