Vulnerability Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sudo Project | Sudo | >= 1.9.14, < 1.9.17 |
| Canonical | Ubuntu Linux | 22.04 |
| Debian | Debian Linux | 11.0 |
| Opensuse | Leap | 15.6 |
| Redhat | Enterprise Linux | 10.0 |
| Suse | Linux Enterprise Desktop | 15 |
| Suse | Linux Enterprise Real Time | 15.0 |
| Suse | Linux Enterprise Server For Sap | 12 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2025-32463Third Party Advisory
- https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463Issue TrackingThird Party Advisory
- https://explore.alas.aws.amazon.com/CVE-2025-32463.htmlThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-32463Third Party Advisory
- https://ubuntu.com/security/notices/USN-7604-1Third Party Advisory
- https://www.openwall.com/lists/oss-security/2025/06/30/3Third Party Advisory
- https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-kExploitThird Party Advisory
- https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chrootExploitThird Party Advisory
- https://www.sudo.ws/releases/changelog/Release Notes
- https://www.sudo.ws/security/advisories/Vendor Advisory
- https://www.sudo.ws/security/advisories/chroot_bug/Vendor Advisory
- https://www.suse.com/security/cve/CVE-2025-32463.htmlThird Party Advisory
- https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/Third Party Advisory
- https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerabilityThird Party Advisory
- https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerabilitMitigationThird Party Advisory
FAQ
What is CVE-2025-32463?
CVE-2025-32463 is a vulnerability with a CVSS score of 9.3 (CRITICAL). Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
How severe is CVE-2025-32463?
CVE-2025-32463 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-32463?
Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap, Redhat Enterprise Linux.