CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems (thehackernews.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 01 Oct 15:32
https://sh.itjust.works/post/47117897

#cybersecurity

threaded - newest

CubitOom@infosec.pub on 01 Oct 16:02 next collapse

This vulnerability could allow a local attacker to leverage sudo’s -R (–chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.

original_reader@lemmy.zip on 01 Oct 18:01 next collapse

The vulnerability in question is CVE-2025-32463 (CVSS score: 9.3), which affects Sudo versions prior to 1.9.17p1

Check your version: sudo --version

As mentioned above, sudo version 1.9.17p1 patches this. This version was already released in June of this year, so many distributions should have it.

perishthethought@piefed.social on 01 Oct 18:57 next collapse

On Ubuntu 24.04

Sudo version 1.9.15p5

Eep!

sem@lemmy.blahaj.zone on 02 Oct 00:13 next collapse

Wait, shouldn’t Ubuntu 24.04 LTS get security bugfixes?

SSUPII@sopuli.xyz on 02 Oct 11:43 collapse

It does. In fact it is fixed.

All decent LTS/stable distros will cherrypick security fixes into whatever version they stabilized themselves on.

GJdan@programming.dev on 02 Oct 08:44 next collapse

It should be backported in supported ubuntu versions.

sudo apt changelog sudo

Tap for spoiler

> sudo (1.9.15p5-3ubuntu5.24.04.1) noble-security; urgency=medium > > * SECURITY UPDATE: Local Privilege Escalation via host option > - debian/patches/CVE-2025-32462.patch: only allow specifying a host > when listing privileges. > - CVE-2025-32462 > * SECURITY UPDATE: Local Privilege Escalation via chroot option > - debian/patches/CVE-2025-32463.patch: remove user-selected root > directory chroot option. > - CVE-2025-32463 > > – Marc Deslauriers marc.deslauriers@ubuntu.com Wed, 25 Jun 2025 08:42:53 -0400

fmstrat@lemmy.nowsci.com on 02 Oct 09:36 collapse

p5. The patch was backported.

HubertManne@piefed.social on 01 Oct 20:17 next collapse

Its funny because whenever I hear about something like this with foss it tends to be this way but when its proprietary I hear on how they were informed a while back, never patched it, and the founder of the bug is now disclosing based on the timetable they gave the. Feels that way anyway.

Cyber@feddit.uk on 02 Oct 05:41 collapse

Thanks for posting the version.

Looks like Arch updated to this version on 1st July.

My DMZ node had it installed a week later, so I’m all smug today

z3rOR0ne@lemmy.ml on 01 Oct 19:43 next collapse

Laughs in opendoas

eleijeep@piefed.social on 01 Oct 21:14 next collapse

nice meme

caseyweederman@lemmy.ca on 02 Oct 00:22 collapse

Ah yes. Security through obscurity.

9488fcea02a9@sh.itjust.works on 02 Oct 12:24 collapse

I tried using the systemd alternatie, run0 or whatever… it’s really weird