- Advertisement -
- Two errors were introduced for the first time at the end of 2013
- They live in the SUDO assignment control utensils
- Patches are available and users are advised to apply them
Two vulnerabilities have recently been spotted in various Linux -Distributions Who, when they are chained together, allow local attackers to escalate their privileges and execute random files.
The vulnerabilities are followed as CVE-2025-32462 (Ernstscore 2.8/10-Lage Ernst) and CVE-2025-32463 (Severity score 9.3/10 critical), and were found in the SUDO Command-Line Utility for Linux and other Unix-Like operating systems.
Of all versions before 1.9.17p1 it was said that they were vulnerable, with Rich Mirch, the stratascal researcher who found the mistakes and said they were hanging for more than ten years before they were discovered. They were introduced for the first time at the end of 2013, he added.
A decade old mistake
SUDO (shortly before “Superuser Do”) is an assignment with which a permitted user can carry out an assignment as the root user or another user, as defined in the system’s security policy. It offers controlled administrative access without users having to log in as the root account.
For example, a user can perform a SUDO assignment that Firefox installs on Ubuntu, because installing software system-wide usually requires administrator rights.
“This mainly has an influence on sites that use a common saudo file that is distributed among several machines,” said Todd C. Miller, a manager for the SUDO project, in advice. “Sites that use on LDAP -based Suroers (including SSSD) are influenced in the same way.”
The patch for SUDO was released at the end of June 2024, after responsible disclosure that took place at the beginning of April.
In addition, various Linux distributions have also released advice, so that the error was recorded for their variant of the operating system. For CVE-2025-32462 this Almalinux 8, Almalinux 9, Alpine Linux, include Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, Suse and Ubuntu, while for CVE-2025-32463, they include Alpine Linux, Amazon Linux, Debian, Gentoo, Red Hat, Suse and Ubuntu.
Linux users are advised to apply the available patches and to ensure that their Linux desktop distributions are generally updated.
Maybe you like it too
- Advertisement -