debcrafters-packages team mailing list archive
-
debcrafters-packages team
-
Mailing list archive
-
Message #03524
[Bug 2116148] Re: sudo CVE-2025-32462 and CVE-2025-32463
Hi Robert,
Thanks for taking the time to report this bug and helping to make Ubuntu better.
Those security issues were already patched, as you can see in both ubuntu security notices:
https://ubuntu.com/security/notices/USN-7604-1
https://ubuntu.com/security/notices/USN-7604-2
Feel free to let us know in case of any other issues.
** Information type changed from Private Security to Public Security
** Changed in: sudo (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of
Debcrafters packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/2116148
Title:
sudo CVE-2025-32462 and CVE-2025-32463
Status in sudo package in Ubuntu:
Fix Released
Bug description:
Jack Wallen
Two critical flaws allow users to gain access to root privileges.
Nearly all major Linux distributions are vulnerable to a couple of
sudo bugs. The two vulnerabilities are CVE-2025-32462 and
CVE-2025-32463. Although the first bug has a low Common Vulnerability
Scoring System (CVSS) score of 2.8, the second has a score of 9.3,
which is critical.
Both vulnerabilities were discovered by the Stratascale's
Cybersecurity Research Unit and the full report can be read here. One
very interesting point in the report states that "CVE-2025-32462 has
remained unnoticed for over 12 years, despite being present in the
code all along."
The report then mentions CVE-2025-32462, when it says, it "...is an
issue that has been hidden in plain sight since the host option was
implemented 12 years ago. Because it’s a built-in option, no exploit
is needed to elevate privileges." The report continues, "However, the
issue can only be leveraged with specific configurations using the
Host or Host_Alias directives, which are commonly used in enterprise
environments."
The sudo --host option allows users to list their sudo rules for a
particular host, and the report goes into detail on how this works in
conjunction with the flaws.
As far as mitigation is concerned, the only thing you need to do is to
confirm that your system's sudo version is at least version 1.9.17p1
or later, which can be done with the command sudo -V. If your version
is older than 1.9.17p1, update immediately.
The version currently shipped with Ubuntu 24.04 is 1.9.15p1, it would
be nice if someone would compile and package the latest version or at
least 1.9.17p1 or later and get it in the updates so our systems can
be secured.
ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: sudo 1.9.15p5-3ubuntu5.24.04.1
Uname: Linux 6.15.4 x86_64
ApportVersion: 2.28.1-0ubuntu3.7
Architecture: amd64
CasperMD5CheckResult: unknown
Date: Mon Jul 7 23:52:33 2025
SourcePackage: sudo
UpgradeStatus: No upgrade log present (probably fresh install)
modified.conffile..etc.sudoers: [inaccessible: [Errno 13] Permission denied: '/etc/sudoers']
modified.conffile..etc.sudoers.d.README: [inaccessible: [Errno 13] Permission denied: '/etc/sudoers.d/README']
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2116148/+subscriptions
Follow ups