CVE-2025-32463

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
References
Link Resource
https://access.redhat.com/security/cve/cve-2025-32463 Third Party Advisory
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 Issue Tracking Third Party Advisory
https://explore.alas.aws.amazon.com/CVE-2025-32463.html Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2025-32463 Third Party Advisory
https://ubuntu.com/security/notices/USN-7604-1 Third Party Advisory
https://www.openwall.com/lists/oss-security/2025/06/30/3 Third Party Advisory
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ Exploit Third Party Advisory
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Exploit Third Party Advisory
https://www.sudo.ws/releases/changelog/ Release Notes
https://www.sudo.ws/security/advisories/ Vendor Advisory
https://www.sudo.ws/security/advisories/chroot_bug/ Vendor Advisory
https://www.suse.com/security/cve/CVE-2025-32463.html Third Party Advisory
https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability Mitigation Third Party Advisory
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*

History

21 Oct 2025, 23:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463 -

21 Oct 2025, 20:20

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:21

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463 -

30 Sep 2025, 13:30

Type Values Removed Values Added
References () https://www.sudo.ws/security/advisories/chroot_bug/ - () https://www.sudo.ws/security/advisories/chroot_bug/ - Vendor Advisory
References () https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability - () https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability - Third Party Advisory
References () https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability - () https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability - Mitigation, Third Party Advisory
References () https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ - () https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ - Third Party Advisory

22 Jul 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability -
  • () https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability -

19 Jul 2025, 03:15

Type Values Removed Values Added
References
  • () https://www.sudo.ws/security/advisories/chroot_bug/ -

18 Jul 2025, 17:15

Type Values Removed Values Added
References
  • () https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ -

17 Jul 2025, 15:56

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/cve-2025-32463 - () https://access.redhat.com/security/cve/cve-2025-32463 - Third Party Advisory
References () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 - () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 - Issue Tracking, Third Party Advisory
References () https://explore.alas.aws.amazon.com/CVE-2025-32463.html - () https://explore.alas.aws.amazon.com/CVE-2025-32463.html - Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2025-32463 - () https://security-tracker.debian.org/tracker/CVE-2025-32463 - Third Party Advisory
References () https://ubuntu.com/security/notices/USN-7604-1 - () https://ubuntu.com/security/notices/USN-7604-1 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2025/06/30/3 - () https://www.openwall.com/lists/oss-security/2025/06/30/3 - Third Party Advisory
References () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ - () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ - Exploit, Third Party Advisory
References () https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot - () https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot - Exploit, Third Party Advisory
References () https://www.sudo.ws/releases/changelog/ - () https://www.sudo.ws/releases/changelog/ - Release Notes
References () https://www.sudo.ws/security/advisories/ - () https://www.sudo.ws/security/advisories/ - Vendor Advisory
References () https://www.suse.com/security/cve/CVE-2025-32463.html - () https://www.suse.com/security/cve/CVE-2025-32463.html - Third Party Advisory
References () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ - () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
First Time Debian
Sudo Project
Canonical ubuntu Linux
Suse linux Enterprise Desktop
Suse linux Enterprise Server For Sap
Suse
Redhat enterprise Linux
Sudo Project sudo
Debian debian Linux
Opensuse
Canonical
Redhat
Suse linux Enterprise Real Time
Opensuse leap

09 Jul 2025, 18:15

Type Values Removed Values Added
References
  • () https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ -

01 Jul 2025, 20:15

Type Values Removed Values Added
Summary
  • (es) Sudo anterior a 1.9.17p1 permite a los usuarios locales obtener acceso root porque /etc/nsswitch.conf desde un directorio controlado por el usuario se utiliza con la opción --chroot.
References
  • () https://access.redhat.com/security/cve/cve-2025-32463 -
  • () https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 -
  • () https://explore.alas.aws.amazon.com/CVE-2025-32463.html -
  • () https://security-tracker.debian.org/tracker/CVE-2025-32463 -
  • () https://ubuntu.com/security/notices/USN-7604-1 -
  • () https://www.suse.com/security/cve/CVE-2025-32463.html -
  • () https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ -

30 Jun 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-30 21:15

Updated : 2025-10-21 23:16


NVD link : CVE-2025-32463

Mitre link : CVE-2025-32463

CVE.ORG link : CVE-2025-32463


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap

suse

  • linux_enterprise_real_time
  • linux_enterprise_desktop
  • linux_enterprise_server_for_sap

sudo_project

  • sudo

canonical

  • ubuntu_linux

redhat

  • enterprise_linux
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere