- Two deficiencies were first introduced by the end of 2013
- They live in the sudo command lining tool
- Patches are available and users are advised to apply them
Two vulnerabilities were recently discovered in different Linux distributions, which, when tied together, allow local attackers to escalate their privileges and thus run arbitrary files.
The vulnerabilities are traced as CVE-2025-32462 (severity 2.8/10-low severity) and CVE-2025-32463 (severity 9.3/10 critical) and was found in the Sudo commanding tool for Linux and other Unix-like operating systems.
All versions before 1.9.17p1 were said to be vulnerable, with Rich Mirch, the Stratascale scientist who found the shortcomings and said they were lingering for more than a decade before they were discovered. They were first introduced in late 2013, he added.
A decade old mistake
Sudo (abbreviation for “Superus DO”) is a command that allows a permissible user to perform a command as a root user or another user, as defined in the system’s security policy. It provides controlled administrative access without requiring users to log in as a root account.
For example, a user may run a sudo command that installs Firefox at Ubuntu, as the installation of the software system usually requires administrative privileges.
“This primarily affects sites that use a common sudoers file that is distributed to several machines,” Todd C. Miller, a maintainer for the Sudo project, said in advice. “Sites that use LDAP-based sudoers (including SSSD) are affected in a similar way.”
Patch to Sudo was released in late June 2024 after responsible disclosure that happened in early April.
Furthermore, various Linux distributions also released advisers and set the mistake of their variant of us. For CVE-2025-32462, these Almalinux 8, Almalinux 9, Alpine Linux, Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, Suspy and Ubuntu include, while for CVE-2025-32463, they include Alpine Linux, Amazon Linux, Debian, Debian, Gentoo, Red Hat, Suse and Ubunt.
Linux users are advised to use the available patches and make sure their Linux -Desktop distributions are generally updated.
Via Hacker the news



