Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-7604-1 | Sudo vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 30 Sep 2025 02:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 23 Jul 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 19 Jul 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Fri, 18 Jul 2025 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Opensuse Opensuse leap Redhat Redhat enterprise Linux Sudo Project Sudo Project sudo Suse Suse linux Enterprise Desktop Suse linux Enterprise Real Time Suse linux Enterprise Server For Sap |
|
| CPEs | cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Opensuse Opensuse leap Redhat Redhat enterprise Linux Sudo Project Sudo Project sudo Suse Suse linux Enterprise Desktop Suse linux Enterprise Real Time Suse linux Enterprise Server For Sap |
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 02:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 02 Jul 2025 05:15:00 +0900
Tue, 01 Jul 2025 23:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 01 Jul 2025 09:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Title | sudo: LPE via chroot option | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 01 Jul 2025 05:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-21T22:45:23.356Z
Reserved: 2025-04-09T00:00:00.000Z
Link: CVE-2025-32463
Updated: 2025-07-01T13:24:32.317Z
Status : Analyzed
Published: 2025-06-30T21:15:30.257
Modified: 2025-11-05T19:26:48.393
Link: CVE-2025-32463
OpenCVE Enrichment
Updated: 2025-07-07T07:16:25Z
Ubuntu USN