CVE-2025-64517

Publication date 12 November 2025

Last updated 19 November 2025


Ubuntu priority

Cvss 3 Severity Score

4.4 · Medium

Score breakdown

Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of `sudo`), effectively negating the intended behaviour of the `targetpw` or `rootpw` options. Version 0.2.10 contains a patch for the issue. Versions prior to 0.2.5 are not affected, since they do not offer `Defaults targetpw` or `Defaults rootpw`.

Read the notes from the security team

Status

Package Ubuntu Release Status
rust-sudo-rs 25.10 questing
Fixed 0.2.8-1ubuntu5.2
25.04 plucky
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy Not in release

Notes


rodrigo-zaiden

Defaults targetpw or Defaults rootpw were added in 0.2.5, so versions prior to that are not affected. USN-7867-1 references LP bug 2130623 but not the CVE because the CVE was assigned later than the package update publication, but it refers to the fix for this issue on questing.

Severity score breakdown

Parameter Value
Base score 4.4 · Medium
Attack vector Local
Attack complexity Low
Privileges required High
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N