{
  "document": {
    "aggregate_severity": {
      "text": "High"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/debian10els/vex/2023/cve-2023-30630-els_os-debian10els.json"
      }
    ],
    "title": "Security update on CVE-2023-30630",
    "tracking": {
      "current_release_date": "2025-12-23T22:15:38Z",
      "generator": {
        "date": "2025-12-23T22:15:38Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2023-30630-ELS_OS-DEBIAN10ELS",
      "initial_release_date": "2023-04-13T16:15:00Z",
      "revision_history": [
        {
          "date": "2023-04-13T16:15:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-11-06T17:11:45Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2025-12-23T22:15:38Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian None",
                "product": {
                  "name": "Debian None",
                  "product_id": "Debian-10",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dmidecode-0:3.2-1+tuxcare.els1.amd64",
                "product": {
                  "name": "dmidecode-0:3.2-1+tuxcare.els1.amd64",
                  "product_id": "dmidecode-0:3.2-1+tuxcare.els1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/dmidecode@3.2-1%2Btuxcare.els1?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dmidecode-3.2-1.amd64",
                "product": {
                  "name": "dmidecode-3.2-1.amd64",
                  "product_id": "dmidecode-3.2-1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/debian/dmidecode@3.2-1?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dmidecode-0:3.2-1+tuxcare.els1.amd64 as a component of Debian None",
          "product_id": "Debian-10:dmidecode-0:3.2-1+tuxcare.els1.amd64"
        },
        "product_reference": "dmidecode-0:3.2-1+tuxcare.els1.amd64",
        "relates_to_product_reference": "Debian-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dmidecode-3.2-1.amd64 as a component of Debian None",
          "product_id": "Debian-10:dmidecode-3.2-1.amd64"
        },
        "product_reference": "dmidecode-3.2-1.amd64",
        "relates_to_product_reference": "Debian-10"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-10:dmidecode-0:3.2-1+tuxcare.els1.amd64"
        ],
        "known_affected": [
          "Debian-10:dmidecode-3.2-1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-30630"
        },
        {
          "category": "external",
          "summary": "https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2",
          "url": "https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2"
        },
        {
          "category": "external",
          "summary": "https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206",
          "url": "https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206"
        },
        {
          "category": "external",
          "summary": "https://github.com/adamreiser/dmiwrite",
          "url": "https://github.com/adamreiser/dmiwrite"
        },
        {
          "category": "external",
          "summary": "https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html",
          "url": "https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html"
        }
      ],
      "release_date": "2023-04-13T16:15:00Z",
      "remediations": [
        {
          "category": "none_available",
          "details": "Affected",
          "product_ids": [
            "Debian-10:dmidecode-3.2-1.amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-10:dmidecode-0:3.2-1+tuxcare.els1.amd64",
            "Debian-10:dmidecode-3.2-1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}