{"schema_version":"1.7.2","id":"OESA-2026-1738","modified":"2026-03-27T14:04:05Z","published":"2026-03-27T14:04:05Z","upstream":["CVE-2026-33554"],"summary":"freeipmi security update","details":"The package provides &amp;quot;Remote-Console&amp;quot; and &amp;quot;System Management software&amp;quot; based on intelligent platform management interface specification.\r\n\r\nSecurity Fix(es):\n\nipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. Three subcommands were found to have exploitable buffer overflows on response messages: &quot;ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,&quot; &quot;ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,&quot; and &quot;ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.&quot;(CVE-2026-33554)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"freeipmi","purl":"pkg:rpm/openEuler/freeipmi&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.11-3.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["freeipmi-1.6.11-3.oe2403sp3.aarch64.rpm","freeipmi-debuginfo-1.6.11-3.oe2403sp3.aarch64.rpm","freeipmi-debugsource-1.6.11-3.oe2403sp3.aarch64.rpm","freeipmi-devel-1.6.11-3.oe2403sp3.aarch64.rpm","freeipmi-help-1.6.11-3.oe2403sp3.aarch64.rpm"],"src":["freeipmi-1.6.11-3.oe2403sp3.src.rpm"],"x86_64":["freeipmi-1.6.11-3.oe2403sp3.x86_64.rpm","freeipmi-debuginfo-1.6.11-3.oe2403sp3.x86_64.rpm","freeipmi-debugsource-1.6.11-3.oe2403sp3.x86_64.rpm","freeipmi-devel-1.6.11-3.oe2403sp3.x86_64.rpm","freeipmi-help-1.6.11-3.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33554"}],"database_specific":{"severity":"High"}}
