Packages
- sudo - Provide limited super user privileges to specific users
Details
Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.
(CVE-2025-32462)
Rich Mirch discovered that Sudo incorrectly handled the chroot option. In
environments where the sudoers file is configured to allow the chroot
option, a local attacker could use this issue to run arbitrary commands as
root. This issue only applied to Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-32463)
Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.
(CVE-2025-32462)
Rich Mirch discovered that Sudo incorrectly handled the chroot option. In
environments where the sudoers file is configured to allow the chroot
option, a local attacker could use this issue to run arbitrary commands as
root. This issue only applied to Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-32463)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
25.04 plucky | sudo – 1.9.16p2-1ubuntu1.1 | ||
sudo-ldap – 1.9.16p2-1ubuntu1.1 | |||
24.10 oracular | sudo – 1.9.15p5-3ubuntu5.24.10.1 | ||
sudo-ldap – 1.9.15p5-3ubuntu5.24.10.1 | |||
24.04 noble | sudo – 1.9.15p5-3ubuntu5.24.04.1 | ||
sudo-ldap – 1.9.15p5-3ubuntu5.24.04.1 | |||
22.04 jammy | sudo – 1.9.9-1ubuntu2.5 | ||
sudo-ldap – 1.9.9-1ubuntu2.5 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.