Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-7604-1 Sudo vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 05:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 30 Sep 2025 02:45:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-09-29T00:00:00+00:00', 'dueDate': '2025-10-20T00:00:00+00:00'}


Wed, 23 Jul 2025 00:15:00 +0900


Sat, 19 Jul 2025 02:15:00 +0900

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux
Opensuse
Opensuse leap
Redhat
Redhat enterprise Linux
Sudo Project
Sudo Project sudo
Suse
Suse linux Enterprise Desktop
Suse linux Enterprise Real Time
Suse linux Enterprise Server For Sap
CPEs cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux
Opensuse
Opensuse leap
Redhat
Redhat enterprise Linux
Sudo Project
Sudo Project sudo
Suse
Suse linux Enterprise Desktop
Suse linux Enterprise Real Time
Suse linux Enterprise Server For Sap

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00325}

epss

{'score': 0.0027}


Thu, 10 Jul 2025 02:45:00 +0900


Wed, 02 Jul 2025 05:15:00 +0900


Tue, 01 Jul 2025 23:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 09:30:00 +0900

Type Values Removed Values Added
Title sudo: LPE via chroot option
Weaknesses CWE-427
References
Metrics threat_severity

None

threat_severity

Important


Tue, 01 Jul 2025 05:45:00 +0900

Type Values Removed Values Added
Description Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T22:45:23.356Z

Reserved: 2025-04-09T00:00:00.000Z

Link: CVE-2025-32463

cve-icon Vulnrichment

Updated: 2025-07-01T13:24:32.317Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-30T21:15:30.257

Modified: 2025-11-05T19:26:48.393

Link: CVE-2025-32463

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-30T14:00:00Z

Links: CVE-2025-32463 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-07T07:16:25Z

Weaknesses