UBUNTU-CVE-2023-30630

Source
https://ubuntu.com/security/CVE-2023-30630
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-30630.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-30630
Upstream
Published
2023-04-13T16:15:00Z
Modified
2025-08-05T04:53:25Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).

References

Affected packages

Ubuntu:Pro:14.04:LTS / dmidecode

Package

Name
dmidecode
Purl
pkg:deb/ubuntu/dmidecode@2.12-2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.12-2

Ubuntu:Pro:16.04:LTS / dmidecode

Package

Name
dmidecode
Purl
pkg:deb/ubuntu/dmidecode@3.0-2ubuntu0.2?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.12-4

3.*

3.0-2
3.0-2ubuntu0.1
3.0-2ubuntu0.2

Ubuntu:Pro:18.04:LTS / dmidecode

Package

Name
dmidecode
Purl
pkg:deb/ubuntu/dmidecode@3.1-1ubuntu0.1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1-1
3.1-1ubuntu0.1

Ubuntu:Pro:20.04:LTS / dmidecode

Package

Name
dmidecode
Purl
pkg:deb/ubuntu/dmidecode@3.2-3?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.2-2
3.2-3

Ubuntu:Pro:20.04:LTS / cpu-x

Package

Name
cpu-x
Purl
pkg:deb/ubuntu/cpu-x@3.2.4-3build2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.2.4-1
3.2.4-2
3.2.4-3
3.2.4-3build1
3.2.4-3build2

Ubuntu:22.04:LTS / cpu-x

Package

Name
cpu-x
Purl
pkg:deb/ubuntu/cpu-x@4.2.0-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.1.0-2
4.2.0-1

Ubuntu:22.04:LTS / dmidecode

Package

Name
dmidecode
Purl
pkg:deb/ubuntu/dmidecode@3.3-3ubuntu0.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.3-3
3.3-3ubuntu0.1
3.3-3ubuntu0.2

Ubuntu:24.04:LTS / cpu-x

Package

Name
cpu-x
Purl
pkg:deb/ubuntu/cpu-x@5.0.3-2build2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.5.3-1

5.*

5.0.3-2
5.0.3-2build1
5.0.3-2build2

Ubuntu:25.04 / cpu-x

Package

Name
cpu-x
Purl
pkg:deb/ubuntu/cpu-x@5.1.3-0.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.4-1
5.0.4-1build1
5.1.1-0.1
5.1.3-0.1