freeipmi-1.6.17-1.el9_7
エラータID: AXSA:2026-584:01
The freeipmi packages contain an Intelligent Platform Management Interface (IPMI) remote console and system management software based on the IPMI specification.
Security Fix(es):
* freeipmi: buffer overflows on response messages via ipmi-oem (CVE-2026-33554)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-33554
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
Update packages.
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
N/A
SRPMS
- freeipmi-1.6.17-1.el9_7.src.rpm
MD5: 94f3e4110e44fe48a5d1b5d93eaf522a
SHA-256: c2242c1f8441527245d2860568a7ed9e059ceda7870a313c28acbc6beda1f014
Size: 3.29 MB
Asianux Server 9 for x86_64
- freeipmi-1.6.17-1.el9_7.i686.rpm
MD5: e396aa38541750cc7e783ed907e83065
SHA-256: ae05eb3ef288a0dfb813533d0faf0c4e73e8e40269ff172d7435e4fe6a09d08a
Size: 1.97 MB - freeipmi-1.6.17-1.el9_7.x86_64.rpm
MD5: 92365b8e7712f6113422344399e7848c
SHA-256: 21ab9a666554e653f736fcf7d4839538ef5bd56b695ff448fd629069c65165a2
Size: 2.04 MB - freeipmi-bmc-watchdog-1.6.17-1.el9_7.x86_64.rpm
MD5: 34c88ffc20c18f581e11ae2bd2ae9e46
SHA-256: cb2f5d56387d86a2b96618520eae6759c048dab1bc8b7ed27b110e1a0e4d61bb
Size: 62.15 kB - freeipmi-devel-1.6.17-1.el9_7.i686.rpm
MD5: 32fbfeb19345989540b7a9628a9f6fec
SHA-256: a53b986bbfe158df772dba3ca5280acf7fb8708c0c8f169f53ec1a494ae584ca
Size: 290.99 kB - freeipmi-devel-1.6.17-1.el9_7.x86_64.rpm
MD5: bfd56fae243d856d5bef391db64be824
SHA-256: d1653289d501755967c032f4c851ebf7c61de0228d5aa99c0a73f627f7e67c03
Size: 291.05 kB - freeipmi-ipmidetectd-1.6.17-1.el9_7.x86_64.rpm
MD5: 399897c6a7fb5ae00aa7fd25fa16f19d
SHA-256: 80bfd34482e21c3cd1de40b4f3a6d28d90a09fdd2a68d8e219989c14b4c632f5
Size: 29.41 kB - freeipmi-ipmiseld-1.6.17-1.el9_7.x86_64.rpm
MD5: 7f8f599231ae33d7b7089ea31b7eb1d4
SHA-256: 3170040d042352d8958756bac8d4d37dcff0134e40b7edfdbd011e44e5310bec
Size: 82.72 kB