U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-32463

Change History

Initial Analysis by NIST 7/17/2025 11:56:53 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
          *cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* versions from (including) 1.9.14 up to (excluding) 1.9.17
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
          *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
          *cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
          *cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
Added Reference Type

								
							
							
						
MITRE: https://access.redhat.com/security/cve/cve-2025-32463 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463 Types: Issue Tracking, Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://explore.alas.aws.amazon.com/CVE-2025-32463.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://security-tracker.debian.org/tracker/CVE-2025-32463 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://ubuntu.com/security/notices/USN-7604-1 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.openwall.com/lists/oss-security/2025/06/30/3 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/ Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.sudo.ws/releases/changelog/ Types: Release Notes
Added Reference Type

								
							
							
						
MITRE: https://www.sudo.ws/security/advisories/ Types: Vendor Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.suse.com/security/cve/CVE-2025-32463.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/ Types: Third Party Advisory