CVE-2025-32462: https://www.openwall.com/lists/oss-security/2025/06/30/2 CVE-2025-32463: https://www.openwall.com/lists/oss-security/2025/06/30/3
CVE: (none) => CVE-2025-32462, CVE-2025-32463Whiteboard: (none) => MGA9TOOStatus comment: (none) => Fixed upstream in 1.9.17p1Source RPM: (none) => sudo-1.9.15p5-3.mga10.src.rpm, sudo-1.9.15p5-1.mga9.src.rpm
Debian has issued an advisory on June 30: https://lists.debian.org/debian-security-announce/2025/msg00118.html
For Cauldron, sudo-1.9.17p1-1.mga10 solved the issues.
Version: Cauldron => 9Whiteboard: MGA9TOO => (none)
No registered maitainer, so assigning to all
CC: (none) => marja11Assignee: bugsquad => pkg-bugs
sudo-1.9.15p5-1.1 is available in 9/updates_testing. Suggested advisory: CVE-2025-32462 - Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines CVE-2025-32463 - Sudo before 1.9.17p1 allows local users to obtain root access because "/etc/nsswitch.conf" from a user-controlled directory is used with the --chroot option. References: https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html RPMS sudo-1.9.15p5-1.1.mga9 sudo-devel-1.9.15p5-1.1.mga9 SRPMS sudo-1.9.15p5-1.1.mga9.src.rpm
QA Contact: security => qa-bugsStatus: NEW => ASSIGNEDCC: (none) => dan
Assignee: pkg-bugs => qa-bugs
Keywords: (none) => advisory
MGA9-64, Mate, VirtualBox installed sudo update Jul 24 20:13:31 vbox [RPM][2652]: erase sudo-1:1.9.15p5-1.mga9.x86_64: success Jul 24 20:13:31 vbox [RPM][2652]: install sudo-1:1.9.15p5-1.1.mga9.x86_64: success Added my user to Wheel group via Mageia Control Center and logged out and back in. I am now able to: sudo miscellaneous commands including journalctl. sudo su sudo journalctl
CC: (none) => brtians1
MGA9-32, Mate, VirtualBox The following package is going to be installed: - sudo-1.9.15p5-1.1.mga9.i586 ----logged out and back in working as expected
Whiteboard: (none) => MGA9-32-OK
Adding the 64-bit OK based on comment 5. Validating.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_updateWhiteboard: MGA9-32-OK => MGA9-32-OK MGA9-64-OK
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2025-0213.html
Resolution: (none) => FIXEDStatus: ASSIGNED => RESOLVED