MGASA-2025-0213

Source
https://advisories.mageia.org/MGASA-2025-0213.html
Import Source
https://advisories.mageia.org/MGASA-2025-0213.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0213
Related
Published
2025-07-25T21:48:21Z
Modified
2025-07-25T21:12:09Z
Summary
Updated sudo packages fix security vulnerabilities
Details

CVE-2025-32462 - Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines CVE-2025-32463 - Sudo before 1.9.17p1 allows local users to obtain root access because "/etc/nsswitch.conf" from a user-controlled directory is used with the --chroot option.

References
Credits

Affected packages

Mageia:9 / sudo

Package

Name
sudo
Purl
pkg:rpm/mageia/sudo?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.15p5-1.1.mga9

Ecosystem specific

{
    "section": "core"
}