The following project was brought to my attention:

  https://github.com/adamreiser/dmiwrite

The project demonstrates how a very permissive sudo configuration can
let an attacker abuse dmidecode for privilege escalation. While it
doesn't exploit any bug in dmidecode, I still consider this a serious
issue as apparently such permissive sudo configurations can be found in
the wild.

Therefore, I decided to add some security hardening to dmidecode to
prevent system administrators from shooting themselves in the foot.
Hopefully the restrictions I'm adding should not affect regular users
of dmidecode who are using this tool for its intended purpose.

-- 
Jean Delvare
SUSE L3 Support

Reply via email to