• [gentoo-announce] [ GLSA 202407-26 ] Dmidecode: Privilege Escalation

    From glsamaker@gentoo.org@21:1/5 to All on Wed Jul 24 08:10:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202407-26
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Dmidecode: Privilege Escalation
    Date: July 24, 2024
    Bugs: #905093
    ID: 202407-26

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Dmidecode, which can lead to
    privilege escalation.

    Background
    ==========

    Dmidecode reports information about your system's hardware as described
    in your system BIOS according to the SMBIOS/DMI standard (see a sample
    output). This information typically includes system manufacturer, model
    name, serial number, BIOS version, asset tag as well as a lot of other
    details of varying level of interest and reliability depending on the manufacturer. This will often include usage status for the CPU sockets, expansion slots (e.g. AGP, PCI, ISA) and memory module slots, and the
    list of I/O ports (e.g. serial, parallel, USB).

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------ ------------ ------------
    sys-apps/dmidecode < 3.5 >= 3.5

    Description
    ===========

    Dmidecode -dump-bin can overwrite a local file. This has security
    relevance because, for example, execution of Dmidecode via sudo is
    plausible.

    Impact
    ======

    Please review the referenced CVE identifier for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Dmidecode users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-apps/dmidecode-3.5"

    References
    ==========

    [ 1 ] CVE-2023-30630
    https://nvd.nist.gov/vuln/detail/CVE-2023-30630

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202407-26

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmagmfoACgkQFMQkOaVy +9nMvA/7B5G0V8nesP5rsjca1unG5yIwWL6/z+b7gJqH5ro1cM6YaiIbiYIqlDk0 VRwix1EOoa+pCeRZcKZWY+akU+v7Z2EOe3yoW1968A6t2N56eC4AiObc/WJ0MWW9 vyAA6Tt0mZdzly339G+nPR0PbH8s70pCw82OOVcpg7HELfYvATFu6X8l6vct5Jkh kI8Jsrz28+/mKNocicz8cVQPbQeHi7DMQMAOgDCDQzCR3hiPf58sHvhGIQWqbsZR WDjaewbg+f7PYyhn7bShob2BhjwJgHuYEQi909Fa0XefN46yG87hpixITSbIVZJc D1PJaeRECbEV8IR/CB/+tgIEyqpIggRaDtoNTcAUZVslRdopYVjjoXEC/EzS0L1I N0cCs+mNanSdRetnPZAxtAGkM5FoK2FhXRNaxsaXEgmolMPQHa8hxXVcP6kT+4fF cWuF4vBgaC7duh7d8rGP8ylZZ4Vv3rz+GeYP1F3MLpT94LZ0K4s5yQTGFE2V9pLz 2Xicmw4nwYei3ruZwPrFoI4sWcl0xqlxRjMr9zJcsQA/QY3muexjuS4PP1e5rZ5M 8Uc1F6jr3SnmpFNsldui7EcjR12E1gbWbB9WYe9otf9aVXcWSmlUQXZ6ntUsO/t4 vqxR95S5amTlegUOA2XZ4+Ru8hMmPRQugwgJNKmuOMMzV+hdRnQ=
    =o7g/
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)