USN-7604-2: Sudo vulnerability

Publication date

30 June 2025

Overview

Sudo could be made to bypass host restrictions.


Packages

  • sudo - Provide limited super user privileges to specific users

Details

USN-7604-1 fixed CVE-2025-32462 in sudo. This update provides the
corresponding fixes for Ubuntu 20.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS.

Original advisory details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.

USN-7604-1 fixed CVE-2025-32462 in sudo. This update provides the
corresponding fixes for Ubuntu 20.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS.

Original advisory details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 focal sudo –  1.8.31-1ubuntu1.5+esm1  
sudo-ldap –  1.8.31-1ubuntu1.5+esm1  
18.04 bionic sudo –  1.8.21p2-3ubuntu1.6+esm1  
sudo-ldap –  1.8.21p2-3ubuntu1.6+esm1  
16.04 xenial sudo –  1.8.16-0ubuntu1.10+esm3  
sudo-ldap –  1.8.16-0ubuntu1.10+esm3  
14.04 trusty sudo –  1.8.9p5-1ubuntu1.5+esm8  
sudo-ldap –  1.8.9p5-1ubuntu1.5+esm8  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›