Bug 1210418 (CVE-2023-30630) - VUL-0: CVE-2023-30630: dmidecode: potential file overwrite (dmiwrite)
Summary: VUL-0: CVE-2023-30630: dmidecode: potential file overwrite (dmiwrite)
Status: RESOLVED FIXED
Alias: CVE-2023-30630
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/363414/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-30630:6.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-13 12:50 UTC by Marcus Meissner
Modified: 2024-04-25 14:19 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Marcus Meissner 2023-04-13 14:53:56 UTC
I filed a CVE request with Mitre
Comment 2 Marcus Meissner 2023-04-13 15:25:35 UTC
use CVE-2023-30630
Comment 3 Jean Delvare 2023-04-14 14:17:11 UTC
For completeness: the exploit requires a dmidecode binary with the setuid permission bit set, or a permissive sudo configuration.
Comment 7 Jean Delvare 2023-04-19 06:30:34 UTC
Maintenance team, please hold on from publishing the maintenance updates I have submitted so far.

While I was preparing the submission for SUSE:SLE-12-SP2:Update yesterday, I spotted a piece of code which is calling the wrong function for years with no functional impact, however after the applying the hardening patches, this bug turns from harmless to user-visible.

I have sent a fix upstream yesterday already:

https://lists.nongnu.org/archive/html/dmidecode-devel/2023-04/msg00016.html

Today I'll backport it to our code streams and resubmit. Sorry for the inconvenience and delay.
Comment 12 Jean Delvare 2023-04-20 09:47:16 UTC
Status update:

* I resubmitted SLE-15-SP4 and SLE-15-SP1 with the regression fixed yesterday.

* I finally have a working backport for SLE-12-SP2 (19 commits, yeah!) which I'll submit this afternoon.
Comment 14 Maintenance Automation 2023-04-21 16:30:06 UTC
SUSE-SU-2023:1947-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1210418
CVE References: CVE-2023-30630
Sources used:
openSUSE Leap Micro 5.3 (src): dmidecode-3.4-150400.16.8.1
openSUSE Leap 15.4 (src): dmidecode-3.4-150400.16.8.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): dmidecode-3.4-150400.16.8.1
SUSE Linux Enterprise Micro 5.3 (src): dmidecode-3.4-150400.16.8.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): dmidecode-3.4-150400.16.8.1
SUSE Linux Enterprise Micro 5.4 (src): dmidecode-3.4-150400.16.8.1
Basesystem Module 15-SP4 (src): dmidecode-3.4-150400.16.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2023-04-26 16:30:10 UTC
SUSE-SU-2023:2044-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1210418
CVE References: CVE-2023-30630
Sources used:
SUSE OpenStack Cloud 9 (src): dmidecode-3.0-10.6.1
SUSE OpenStack Cloud Crowbar 9 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server 12 SP5 (src): dmidecode-3.0-10.6.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): dmidecode-3.0-10.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Maintenance Automation 2023-05-16 12:30:18 UTC
SUSE-SU-2023:2215-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1210418
CVE References: CVE-2023-30630
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Real Time 15 SP3 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): dmidecode-3.2-150100.9.16.1
SUSE Manager Proxy 4.2 (src): dmidecode-3.2-150100.9.16.1
SUSE Manager Retail Branch Server 4.2 (src): dmidecode-3.2-150100.9.16.1
SUSE Manager Server 4.2 (src): dmidecode-3.2-150100.9.16.1
SUSE Enterprise Storage 7.1 (src): dmidecode-3.2-150100.9.16.1
SUSE Enterprise Storage 7 (src): dmidecode-3.2-150100.9.16.1
SUSE CaaS Platform 4.0 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Micro 5.1 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Micro 5.2 (src): dmidecode-3.2-150100.9.16.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): dmidecode-3.2-150100.9.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Jean Delvare 2023-11-29 10:57:29 UTC
Fix has been released on all affected products as far as I can see, so I think this can be closed. Reassigning to the security team.
Comment 18 Jean Delvare 2024-04-25 14:16:55 UTC
Security team, any reason why this bug is still opened?
Comment 19 Marcus Meissner 2024-04-25 14:19:31 UTC
done