How to enable creation of core dumps of segfaulting sudo
This document (000020861) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 15 All Releases
This is not sufficient for sudo, though, as by default it temporarily disables core dumps during execution. Immediately before running the program to run, sudo enables it again. To enable core dumps during the execution of sudo, edit the file /etc/sudo.conf (not sudoers) and add the line
When sudo crashes with this setting, a core dump will be created.
Once you have captured the core dump, either remove the line again or set disable_coredump to true to avoid login credentials from leaking through unnoticed core dumps. Deleting core files of sudo immediately after having them analyzed is strongly recommended.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000020861
- Creation Date: 16-Nov-2022
- Modified Date:17-Nov-2022
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com