Critical Vulnerability on sudo

CISA Alert: Critical Vulnerability in Sudo 🚨

A new vulnerability has been added by CISA to the Known Exploited Vulnerabilities (KEV) catalog:

🔹 CVE-2025-32463
CVSS Score: 9.3 (Critical)

Affected: All Sudo versions prior to 1.9.17p1
Platforms: All Linux distributions and Unix-like systems

According to CISA:
Sudo contains a flaw that allows third-party functionality to be invoked without proper domain checks. This vulnerability enables a local attacker to execute arbitrary commands with root privileges using the sudo -R (chroot) option—even if they are not listed in the sudoers file.

Confirmed exploitation in:
✔️ Ubuntu 24.04.1 (Sudo 1.9.15p5, 1.9.16p2)
✔️ Fedora 41 Server (Sudo 1.9.15p5)
✔️ Other distributions with security advisories: Alpine Linux, Amazon Linux, Debian, Gentoo, Red Hat

Check current version:
sudo -V

Immediate Update Instructions:
🔵 Debian / Ubuntu
sudo apt update
sudo apt install –only-upgrade sudo

🔵 RHEL / CentOS
sudo yum update sudo # Older versions
sudo dnf upgrade sudo # Newer versions

🔵 Fedora
sudo dnf upgrade sudo

🔵openSUSE (Leap / Tumbleweed)
sudo zypper refresh
sudo zypper update sudo

🔵Gentoo
sudo emerge –sync
sudo emerge –ask –verbose –update sudo

🔵Alpine Linux
sudo apk update
sudo apk upgrade sudo

💡 Recommendation: All Linux/Unix administrators should update immediately.

source: https://predator-os.ir/

Thanks to Levko for this update.


Discover more from Vancouver Linux Users Group

Subscribe to get the latest posts sent to your email.


Posted

in

by

Discover more from Vancouver Linux Users Group

Subscribe now to keep reading and get access to the full archive.

Continue reading