PT-2025-27465 · Sudo +7 · Sudo +7
Rich Mirch
·
Published
2025-06-30
·
Updated
2025-07-17
·
CVE-2025-32462
2.8
Low
Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N |
## Vulnerability Report
**Name of the Vulnerable Software and Affected Versions:**
Sudo versions prior to 1.9.17p1
Sudo versions 1.8.8 through 1.9.17
Sudo versions prior to 1.9.5p2-3+deb11u2 (Debian 11 bullseye)
Sudo versions prior to 1.9.13p3-1+deb12u2 (Debian bookworm)
Sudo versions prior to 1.9.16p2-1ubuntu1.1 (Ubuntu plucky)
Sudo versions prior to 1.8.31-1ubuntu1.5+esm1 (Ubuntu 20.04 LTS, 18.04 LTS, 16.04 LTS, and 14.04 LTS)
**Description:**
Sudo, a program designed to provide limited super user privileges, contains a vulnerability related to the handling of the `-h` or `--host` option. The `-h` option was not correctly restricted to listing privileges and could be misused when running commands via `sudo` or editing files with `sudoedit`. This flaw could allow a local attacker to escalate their privileges. The vulnerability stems from a logic bypass in the host matching functionality, potentially allowing a user to execute commands with elevated privileges on unintended machines.
**Recommendations:**
- Upgrade to Sudo version 1.9.17p1 or later.
- For Debian 11 bullseye, upgrade to Sudo version 1.9.5p2-3+deb11u2 or later.
- For Debian bookworm, upgrade to Sudo version 1.9.13p3-1+deb12u2 or later.
- For Ubuntu plucky, upgrade to Sudo version 1.9.16p2-1ubuntu1.1 or later.
- For Ubuntu 20.04 LTS, 18.04 LTS, 16.04 LTS, and 14.04 LTS, upgrade to version 1.8.31-1ubuntu1.5+esm1 or later.
Fix
LPE
Incorrect Authorization
Weakness Enumeration
Related Identifiers
Affected Products
References · 133
- https://security-tracker.debian.org/tracker/DSA-5954-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2025:02175-1 · Vendor Advisory
- https://osv.dev/vulnerability/DSA-5954-1 · Vendor Advisory
- https://osv.dev/vulnerability/ALSA-2025:9978 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-32462 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/sudo · Vendor Advisory
- https://errata.almalinux.org/9/ALSA-2025-9978.html · Vendor Advisory
- https://osv.dev/vulnerability/DLA-4235-1 · Vendor Advisory
- https://linux.oracle.com/errata/ELSA-2025-10110.html · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2025:02177-1 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7604-1 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2025-8851 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462 · Security Note
- https://ubuntu.com/security/CVE-2025-32462 · Vendor Advisory
- https://osv.dev/vulnerability/USN-7604-2 · Vendor Advisory