Inclusion of Functionality from Untrusted Control Sphere Affecting sudo package, versions <0:1.9.15-8.p5.el10_0.2


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

Exploit Maturity
Attacked
EPSS
44.46% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE10-SUDO-10881022
  • published23 Jul 2025
  • disclosed30 Jun 2025

Introduced: 30 Jun 2025

CVE-2025-32463  (opens in a new tab)
CWE-829  (opens in a new tab)

How to fix?

Upgrade Oracle:10 sudo to version 0:1.9.15-8.p5.el10_0.2 or higher.
This issue was patched in ELSA-2025-11537.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sudo package and not the sudo package as distributed by Oracle. See How to fix? for Oracle:10 relevant fixed versions and status.

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

References

CVSS Base Scores

version 3.1