Source: freeipmi
Version: 1.6.16-1
Severity: important
Tags: security upstream
Forwarded: https://savannah.gnu.org/bugs/?68140 
https://savannah.gnu.org/bugs/?68141 https://savannah.gnu.org/bugs/?68142
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>




*** /tmp/freeipmi.reportbug
Package: freeipmi
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerability was published for freeipmi.

CVE-2026-33554[0]:
| ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows
| on response messages. The Intelligent Platform Management Interface
| (IPMI) specification defines a set of interfaces for platform
| management. It is implemented by a large number of hardware
| manufacturers to support system management. It is most commonly used
| for sensor reading (e.g., CPU temperatures through the ipmi-sensors
| command within FreeIPMI) and remote power control (the ipmipower
| command). The ipmi-oem client command implements a set of a IPMI OEM
| commands for specific hardware vendors. If a user has supported
| hardware, they may wish to use the ipmi-oem command to send a
| request to a server to retrieve specific information. Three
| subcommands were found to have exploitable buffer overflows on
| response messages. They are: "ipmi-oem dell get-last-post-code - get
| the last POST code and string describing the error on some Dell
| servers," "ipmi-oem supermicro extra-firmware-info - get extra
| firmware info on Supermicro servers," and "ipmi-oem wistron read-
| proprietary-string - read a proprietary string on Wistron servers."


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33554
    https://www.cve.org/CVERecord?id=CVE-2026-33554
[1] https://savannah.gnu.org/bugs/?68140
[2] https://savannah.gnu.org/bugs/?68141
[3] https://savannah.gnu.org/bugs/?68142
[4] 
https://cgit.git.savannah.gnu.org/cgit/freeipmi.git/commit/?id=b03ca4d1bff4626c11db8684564b88cd26a2425d


Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to