vulnerability

Amazon Linux 2023: CVE-2025-32462: Important priority package update for sudo

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Jun 30, 2025
Added
Jul 11, 2025
Modified
Jul 11, 2025

Description

A privilege escalation vulnerability was found in Sudo. In certain configurations, unauthorized users can gain elevated system privileges via the Sudo host option (`-h` or `--host`). When using the default sudo security policy plugin (sudoers), the host option is intended to be used in conjunction with the list option (`-l` or `--list`) to determine what permissions a user has on a different system. However, this restriction can be bypassed, allowing a user to elevate their privileges on one system to the privileges they may have on a different system, effectively ignoring the host identifier in any sudoers rules. This vulnerability is particularly impactful for systems that share a single sudoers configuration file across multiple computers or use network-based user directories, such as LDAP, to provide sudoers rules on a system.

Solutions

amazon-linux-2023-upgrade-sudoamazon-linux-2023-upgrade-sudo-debuginfoamazon-linux-2023-upgrade-sudo-debugsourceamazon-linux-2023-upgrade-sudo-develamazon-linux-2023-upgrade-sudo-logsrvdamazon-linux-2023-upgrade-sudo-logsrvd-debuginfoamazon-linux-2023-upgrade-sudo-python-pluginamazon-linux-2023-upgrade-sudo-python-plugin-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.