CVE-2026-33554

NameCVE-2026-33554
Descriptionipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeipmi (PTS)bullseye1.6.6-4+deb11u1vulnerable
bookworm1.6.10-1vulnerable
trixie1.6.15-1vulnerable
forky, sid1.6.16-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeipmisource(unstable)(unfixed)

Notes

https://savannah.gnu.org/bugs/?68140
https://savannah.gnu.org/bugs/?68141
https://savannah.gnu.org/bugs/?68142
Fixed by: https://cgit.git.savannah.gnu.org/cgit/freeipmi.git/commit/?id=b03ca4d1bff4626c11db8684564b88cd26a2425d (freeipmi-1-6-17)

Search for package or bug name: Reporting problems