Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AI mental illness lawyer warns of risk of mass casualties

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Wiz investors unravel Google’s $32 billion acquisition

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » A critical sudo vulnerability allows local users to gain root access to Linux and affect major distributions
Identity

A critical sudo vulnerability allows local users to gain root access to Linux and affect major distributions

By July 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 4, 2025Ravi LakshmananVulnerability / Linux

Cybersecurity researchers have disclosed two security flaws in SUDO command line utilities in operating systems like Linux and UNIX, allowing local attackers to escalate the privileges of rooting sensitive machines.

A brief explanation of the vulnerability can be found below:

CVE-2025-32462 (CVSS score: 2.8) – Use in a sudoers file that specifies sudo before 1.9.17p1, not current host nor all hosts, allowing the listed machines to execute the command. “/etc/nsswitch.conf” from the user-controlled directory is used with the -chroot option

Sudo is a command line tool that allows you to run commands as another user, such as a superuser. By implementing instructions in SUDO, the idea is to implement the minimum principle of privilege and allow users to take administrative measures without the need to increase their authority.

Cybersecurity

The command is configured through a file called “/etc/sudoers” that determines “the person who can determine which machine user can run the command and controls special things like whether a particular command requires a password.”

Stratascale researcher Rich Mirch is acknowledged to have discovered and reported the defect, saying CVE-2025-32462 was able to slip through the crack for more than 12 years. This is rooted in the sudo’s “-H” (host) option, which allows you to list sudo privileges for users on different hosts. This feature was enabled in September 2013.

However, the identified bug allowed the remote host to execute the allowed commands on the local machine.

“This primarily affects sites that use common sudoers files distributed to multiple machines,” Sudo Project Maintenance Todd C. Miller said in an advisory. “Sites that use LDAP-based sudoers (including SSSDs) will be similarly affected.”

CVE-2025-32463, on the other hand, takes advantage of sudo’s “-r” (chroot) option to run the arbitraryary command as root, even if it is not listed in the sudoers file. It is also a flaw in severity.

“The default sudo configuration is vulnerable,” says Mirch. “The vulnerability includes the sudo chroot feature, but there is no need to define sudo rules for users. As a result, local, unlucky users could potentially escalate their permissions if a vulnerable version is installed.”

In other words, this flaw causes the attacker to load arbitrary shared libraries by creating a “/etc/nsswitch.conf” configuration file under the user-specified root directory and running a potentially highly privileged malicious command.

Miller said that the Chroot option will be removed entirely from a future release of Sudo, and supporting user-specified root directories is “error prone.”

Cybersecurity

Following the responsible disclosure on April 1, 2025, the vulnerability is addressed in SUDO version 1.9.17p1, released later last month. Because sudo is installed on many of them, recommendations have also been issued by various Linux distributions –

CVE-2025-32462-Almalinux 8, Almalinux 9, Alpine Linux, Amazon Linux, Debian, Gentoo, Oracle Linux, Red Hat, Suse, and Ubuntu CVE-2025-32463-Alpine Linux, Amazon Linux, Debian, Gentoo, Red, Ubuntuu

Users are advised to apply the necessary fixes and ensure that their Linux desktop distribution is updated with the latest packages.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBPX steering group to advance battery modeling standards
Next Article AI Agent may be leaking data – Watch this webinar and learn how to stop it

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI mental illness lawyer warns of risk of mass casualties

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Wiz investors unravel Google’s $32 billion acquisition

Rivian’s RJ Scaringe thinks we’re developing robots completely wrong

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.