CVE-2023-30630

NameCVE-2023-30630
DescriptionDmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1034483

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dmidecode (PTS)bullseye3.3-2vulnerable
bookworm3.4-1vulnerable
trixie, sid3.6-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dmidecodesource(unstable)3.5-1unimportant1034483

Notes

https://github.com/adamreiser/dmiwrite
https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2
Negligible security impact, a user-controlled file overwrite should not receive a CVE in general

Search for package or bug name: Reporting problems