CVE-2025-32463

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
References
Link Resource
https://access.redhat.com/security/cve/cve-2025-32463 Third Party Advisory
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 Issue Tracking Third Party Advisory
https://explore.alas.aws.amazon.com/CVE-2025-32463.html Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2025-32463 Third Party Advisory
https://ubuntu.com/security/notices/USN-7604-1 Third Party Advisory
https://www.openwall.com/lists/oss-security/2025/06/30/3 Third Party Advisory
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ Exploit Third Party Advisory
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Exploit Third Party Advisory
https://www.sudo.ws/releases/changelog/ Release Notes
https://www.sudo.ws/security/advisories/ Vendor Advisory
https://www.sudo.ws/security/advisories/chroot_bug/ Vendor Advisory
https://www.suse.com/security/cve/CVE-2025-32463.html Third Party Advisory
https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability Mitigation Third Party Advisory
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/ Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463 US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*

History

05 Nov 2025, 19:26

Type Values Removed Values Added
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463 - US Government Resource

Information

Published : 2025-06-30 21:15

Updated : 2025-11-05 19:26


NVD link : CVE-2025-32463

Mitre link : CVE-2025-32463

CVE.ORG link : CVE-2025-32463


JSON object : View

Products Affected

redhat

  • enterprise_linux

debian

  • debian_linux

opensuse

  • leap

suse

  • linux_enterprise_real_time
  • linux_enterprise_server_for_sap
  • linux_enterprise_desktop

sudo_project

  • sudo

canonical

  • ubuntu_linux
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere