CVE-2025-32463

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*

History

22 Jul 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability -
  • () https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability -

19 Jul 2025, 03:15

Type Values Removed Values Added
References
  • () https://www.sudo.ws/security/advisories/chroot_bug/ -

18 Jul 2025, 17:15

Type Values Removed Values Added
References
  • () https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ -

17 Jul 2025, 15:56

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/cve-2025-32463 - () https://access.redhat.com/security/cve/cve-2025-32463 - Third Party Advisory
References () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 - () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 - Issue Tracking, Third Party Advisory
References () https://explore.alas.aws.amazon.com/CVE-2025-32463.html - () https://explore.alas.aws.amazon.com/CVE-2025-32463.html - Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2025-32463 - () https://security-tracker.debian.org/tracker/CVE-2025-32463 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-7604-1 - () https://ubuntu.com/security/notices/USN-7604-1 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2025/06/30/3 - () https://www.openwall.com/lists/oss-security/2025/06/30/3 - Third Party Advisory
References () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ - () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ - Exploit, Third Party Advisory
References () https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot - () https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot - Exploit, Third Party Advisory
References () https://www.sudo.ws/releases/changelog/ - () https://www.sudo.ws/releases/changelog/ - Release Notes
References () https://www.sudo.ws/security/advisories/ - () https://www.sudo.ws/security/advisories/ - Vendor Advisory
References () https://www.suse.com/security/cve/CVE-2025-32463.html - () https://www.suse.com/security/cve/CVE-2025-32463.html - Third Party Advisory
References () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ - () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ - Third Party Advisory
First Time Suse linux Enterprise Server For Sap
Redhat
Suse linux Enterprise Real Time
Sudo Project
Debian
Opensuse leap
Suse
Canonical ubuntu Linux
Sudo Project sudo
Suse linux Enterprise Desktop
Debian debian Linux
Canonical
Opensuse
Redhat enterprise Linux
CPE cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

09 Jul 2025, 18:15

Type Values Removed Values Added
References
  • () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ -

01 Jul 2025, 20:15

Type Values Removed Values Added
Summary
  • (es) Sudo anterior a 1.9.17p1 permite a los usuarios locales obtener acceso root porque /etc/nsswitch.conf desde un directorio controlado por el usuario se utiliza con la opción --chroot.
References
  • () https://access.redhat.com/security/cve/cve-2025-32463 -
  • () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 -
  • () https://explore.alas.aws.amazon.com/CVE-2025-32463.html -
  • () https://security-tracker.debian.org/tracker/CVE-2025-32463 -
  • () https://ubuntu.com/security/notices/USN-7604-1 -
  • () https://www.suse.com/security/cve/CVE-2025-32463.html -
  • () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ -

30 Jun 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-30 21:15

Updated : 2025-07-22 15:15


NVD link : CVE-2025-32463

Mitre link : CVE-2025-32463

CVE.ORG link : CVE-2025-32463


JSON object : View

Products Affected

suse

  • linux_enterprise_real_time
  • linux_enterprise_server_for_sap
  • linux_enterprise_desktop

sudo_project

  • sudo

canonical

  • ubuntu_linux

debian

  • debian_linux

opensuse

  • leap

redhat

  • enterprise_linux
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere