CVE-2025-32463

Name
CVE-2025-32463
Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://www.openwall.com/lists/oss-security/2025/06/30/3
cve@mitre.org https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
cve@mitre.org https://www.sudo.ws/releases/changelog/
cve@mitre.org https://www.sudo.ws/security/advisories/
cve@mitre.org https://access.redhat.com/security/cve/cve-2025-32463
cve@mitre.org https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
cve@mitre.org https://explore.alas.aws.amazon.com/CVE-2025-32463.html
cve@mitre.org https://security-tracker.debian.org/tracker/CVE-2025-32463
cve@mitre.org https://ubuntu.com/security/notices/USN-7604-1
cve@mitre.org https://www.suse.com/security/cve/CVE-2025-32463.html
cve@mitre.org https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/
cve@mitre.org https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/
134c704f-9b21-4f2e-91b3-4a467353bcc0 https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/
cve@mitre.org https://www.sudo.ws/security/advisories/chroot_bug/
cve@mitre.org https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability
cve@mitre.org https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability
134c704f-9b21-4f2e-91b3-4a467353bcc0 https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463

Match rules

CPE URI Source package Min version Max version
sudo >= 1.9.14 < 1.9.17p1
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* sudo >= 1.9.14 < 1.9.17
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:* sudo == None == 1.9.17

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
sudo edge-community 1.9.17_p2-r0 Celeste <cielesti@protonmail.com> fixed
sudo edge-community 1.9.17_p1-r0 Celeste <cielesti@protonmail.com> fixed
sudo edge-community 1.9.17-r0 Celeste <cielesti@protonmail.com> possibly vulnerable
sudo edge-community 1.9.16_p2-r1 Celeste <cielesti@protonmail.com> possibly vulnerable
sudo edge-community 1.9.16_p2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
sudo 3.22-community 1.9.17_p2-r0 Celeste <cielesti@protonmail.com> fixed
sudo 3.22-community 1.9.17_p1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
sudo 3.22-community 1.9.16_p2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable