Synopsis:
freeipmi security updateSummary:
An update for freeipmi is now available for openEuler-22.03-LTS-SP4Description:
The package provides "Remote-Console" and "System Management software" based on intelligent platform management interface specification.
Security Fix(es):
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. Three subcommands were found to have exploitable buffer overflows on response messages: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."(CVE-2026-33554)Topic:
An update for freeipmi is now available for openEuler-22.03-LTS-SP4.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.Severity:
HighAffected Component:
freeipmi
1.6.8-6.oe2203sp41.6.8-6.oe2203sp41.6.8-6.oe2203sp41.6.8-6.oe2203sp41.6.8-6.oe2203sp4Exploitability
AV:NAC:LPR:NUI:NScope
S:UImpact
C:NI:NA:H7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H