Critical Vulnerability Information 1. Local Privilege Escalation via chroot option Affected Sudo Versions: 1.9.14 to 1.9.17 (inclusive) CVE ID: CVE-2025-32463 2. Local Privilege Escalation via host option Description: The option in Sudo, when used in combination with the or options, contains a local privilege escalation vulnerability. Affected Sudo Versions: Not explicitly listed 3. Double free with per-command chroot sudoers rules Affected Sudo Versions: 1.9.8 to 1.9.13p1 (inclusive) CVE ID: CVE-2023-27326 4. Sudoedit can edit arbitrary files Affected Sudo Versions: 1.8.0 to 1.9.12p1 (inclusive) CVE ID: CVE-2023-22808 5. Buffer overflow in command line unescaping Affected Sudo Versions: 1.7.7 to 1.7.10p8, 1.8.2 to 1.8.31p2, and 1.9.0 to 1.9.5p1 Description: A stack-based buffer overflow exists, exploitable by any local user. 6. Symbolic link attack in SELinux-enabled sudoedit Description: On systems with SELinux enabled, the sudoedit command may be vulnerable to symbolic link attacks. 7. Buffer overflow when pwfeedback is set in sudoers Description: A buffer overflow may occur when the pwfeedback option is set in sudoers. 8. Potential bypass of Runas user restrictions Description: There may be a potential bypass of Runas user restrictions. 9. Potential file overwrite or tty access on Linux Description: On Linux systems, there may be issues related to file overwriting or tty access. 10. Potential bypass of sudo_noexec.so on Linux Affected Sudo Versions: 1.8.0 to 1.8.14p3 (inclusive) CVE ID: CVE-2016-7035