CVE-2023-30630
Publication date 13 April 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.
Mitigation
Do not configure sudoers file to allow running dmidecode with elevated privileges.
Status
Package | Ubuntu Release | Status |
---|---|---|
cpu-x | 24.10 oracular |
Needs evaluation
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support | |
dmidecode | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Vulnerable
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of ESM support, was needs-triage |
Notes
rodrigo-zaiden
cpu-x embedds dmidecode source
mdeslaur
This CVE relies on an improbable non-default configuration of allowing an unprivileged user to run demidecode under sudo with a specific insecure configuration in the sudoers file. Using dmidecode in such a manner is no different than allowing any other tool to unexpectedly run with elevated privileges. Setting priority to low. The upstream commits listed below only prevent overwriting a file as root, but still allows creating arbitrary files as root so using dmidecode with elevated privileges via sudoers is still unsafe.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.1 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |