Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-33554 (GCVE-0-2026-33554)
Vulnerability from cvelistv5 – Published: 2026-03-24 00:00 – Updated: 2026-03-24 18:50- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-33554",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-24T18:50:27.676350Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T18:50:48.586Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T14:05:40.956Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://savannah.gnu.org/bugs/?68140"
},
{
"url": "https://savannah.gnu.org/bugs/?68141"
},
{
"url": "https://savannah.gnu.org/bugs/?68142"
},
{
"url": "https://ftp.gnu.org/gnu/freeipmi/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2026-33554",
"datePublished": "2026-03-24T00:00:00.000Z",
"dateReserved": "2026-03-22T00:00:00.000Z",
"dateUpdated": "2026-03-24T18:50:48.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-33554",
"date": "2026-05-05",
"epss": "0.00059",
"percentile": "0.18303"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-33554\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2026-03-24T15:16:35.743\",\"lastModified\":\"2026-04-27T19:18:46.690\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \\\"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\\\" \\\"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\\\" and \\\"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\\\"\"},{\"lang\":\"es\",\"value\":\"ipmi-oem en FreeIPMI anterior a 1.16.17 tiene desbordamientos de b\u00fafer explotables en mensajes de respuesta. La especificaci\u00f3n de la Interfaz de Gesti\u00f3n de Plataforma Inteligente (IPMI) define un conjunto de interfaces para la gesti\u00f3n de plataformas. Es implementada por un gran n\u00famero de fabricantes de hardware para soportar la gesti\u00f3n del sistema. Se utiliza m\u00e1s com\u00fanmente para la lectura de sensores (por ejemplo, temperaturas de CPU a trav\u00e9s del comando ipmi-sensors dentro de FreeIPMI) y el control remoto de energ\u00eda (el comando ipmipower). El comando cliente ipmi-oem implementa un conjunto de comandos IPMI OEM para proveedores de hardware espec\u00edficos. Si un usuario tiene hardware compatible, puede desear usar el comando ipmi-oem para enviar una solicitud a un servidor para recuperar informaci\u00f3n espec\u00edfica. Se encontr\u00f3 que tres subcomandos ten\u00edan desbordamientos de b\u00fafer explotables en mensajes de respuesta. Son: \u0027ipmi-oem dell get-last-post-code - obtener el \u00faltimo c\u00f3digo POST y la cadena que describe el error en algunos servidores Dell,\u0027 \u0027ipmi-oem supermicro extra-firmware-info - obtener informaci\u00f3n extra de firmware en servidores Supermicro,\u0027 y \u0027ipmi-oem wistron read-proprietary-string - leer una cadena propietaria en servidores Wistron.\u0027\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://ftp.gnu.org/gnu/freeipmi/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://savannah.gnu.org/bugs/?68140\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://savannah.gnu.org/bugs/?68141\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://savannah.gnu.org/bugs/?68142\",\"source\":\"cve@mitre.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-33554\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T18:50:27.676350Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121 Stack-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T18:50:44.689Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://savannah.gnu.org/bugs/?68140\"}, {\"url\": \"https://savannah.gnu.org/bugs/?68141\"}, {\"url\": \"https://savannah.gnu.org/bugs/?68142\"}, {\"url\": \"https://ftp.gnu.org/gnu/freeipmi/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \\\"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\\\" \\\"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\\\" and \\\"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\\\"\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-03-24T14:05:40.956Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-33554\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-24T18:50:48.586Z\", \"dateReserved\": \"2026-03-22T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2026-03-24T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-33554
Vulnerability from fkie_nvd - Published: 2026-03-24 15:16 - Updated: 2026-04-27 19:18| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\""
},
{
"lang": "es",
"value": "ipmi-oem en FreeIPMI anterior a 1.16.17 tiene desbordamientos de b\u00fafer explotables en mensajes de respuesta. La especificaci\u00f3n de la Interfaz de Gesti\u00f3n de Plataforma Inteligente (IPMI) define un conjunto de interfaces para la gesti\u00f3n de plataformas. Es implementada por un gran n\u00famero de fabricantes de hardware para soportar la gesti\u00f3n del sistema. Se utiliza m\u00e1s com\u00fanmente para la lectura de sensores (por ejemplo, temperaturas de CPU a trav\u00e9s del comando ipmi-sensors dentro de FreeIPMI) y el control remoto de energ\u00eda (el comando ipmipower). El comando cliente ipmi-oem implementa un conjunto de comandos IPMI OEM para proveedores de hardware espec\u00edficos. Si un usuario tiene hardware compatible, puede desear usar el comando ipmi-oem para enviar una solicitud a un servidor para recuperar informaci\u00f3n espec\u00edfica. Se encontr\u00f3 que tres subcomandos ten\u00edan desbordamientos de b\u00fafer explotables en mensajes de respuesta. Son: \u0027ipmi-oem dell get-last-post-code - obtener el \u00faltimo c\u00f3digo POST y la cadena que describe el error en algunos servidores Dell,\u0027 \u0027ipmi-oem supermicro extra-firmware-info - obtener informaci\u00f3n extra de firmware en servidores Supermicro,\u0027 y \u0027ipmi-oem wistron read-proprietary-string - leer una cadena propietaria en servidores Wistron.\u0027"
}
],
"id": "CVE-2026-33554",
"lastModified": "2026-04-27T19:18:46.690",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-03-24T15:16:35.743",
"references": [
{
"source": "cve@mitre.org",
"url": "https://ftp.gnu.org/gnu/freeipmi/"
},
{
"source": "cve@mitre.org",
"url": "https://savannah.gnu.org/bugs/?68140"
},
{
"source": "cve@mitre.org",
"url": "https://savannah.gnu.org/bugs/?68141"
},
{
"source": "cve@mitre.org",
"url": "https://savannah.gnu.org/bugs/?68142"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
RHSA-2026:13515
Vulnerability from csaf_redhat - Published: 2026-05-04 14:25 - Updated: 2026-05-04 21:18A flaw was found in FreeIPMI. The `ipmi-oem` program is used to send Intelligent Platform Management Interface (IPMI) OEM commands for specific hardware vendors to retrieve specific information from the hardware. A malicious server can reply with crafted response messages and cause buffer overflows when processed, potentially resulting in a denial of service and memory corruption.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeipmi is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The freeipmi packages contain an Intelligent Platform Management Interface (IPMI) remote console and system management software based on the IPMI specification.\n\nSecurity Fix(es):\n\n* freeipmi: buffer overflows on response messages via ipmi-oem (CVE-2026-33554)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:13515",
"url": "https://access.redhat.com/errata/RHSA-2026:13515"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2450778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450778"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_13515.json"
}
],
"title": "Red Hat Security Advisory: freeipmi security update",
"tracking": {
"current_release_date": "2026-05-04T21:18:57+00:00",
"generator": {
"date": "2026-05-04T21:18:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:13515",
"initial_release_date": "2026-05-04T14:25:24+00:00",
"revision_history": [
{
"date": "2026-05-04T14:25:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-04T14:25:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T21:18:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debugsource@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog-debuginfo@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd-debuginfo@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld-debuginfo@1.6.17-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"product": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"product_id": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-devel@1.6.17-1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-0:1.6.17-1.el10_1.src",
"product": {
"name": "freeipmi-0:1.6.17-1.el10_1.src",
"product_id": "freeipmi-0:1.6.17-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi@1.6.17-1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debugsource@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog-debuginfo@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd-debuginfo@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld-debuginfo@1.6.17-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"product": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"product_id": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-devel@1.6.17-1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debugsource@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog-debuginfo@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd-debuginfo@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld-debuginfo@1.6.17-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"product": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"product_id": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-devel@1.6.17-1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debugsource@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-bmc-watchdog-debuginfo@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-debuginfo@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmidetectd-debuginfo@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-ipmiseld-debuginfo@1.6.17-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"product": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"product_id": "freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeipmi-devel@1.6.17-1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-03-24T15:01:31.634764+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FreeIPMI. The `ipmi-oem` program is used to send Intelligent Platform Management Interface (IPMI) OEM commands for specific hardware vendors to retrieve specific information from the hardware. A malicious server can reply with crafted response messages and cause buffer overflows when processed, potentially resulting in a denial of service and memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeipmi: buffer overflows on response messages via ipmi-oem",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this vulnerability, a user needs to execute the `ipmi-oem` program to retrieve information from a compromised or malicious Baseboard Management Controller (BMC) server, limiting the exposure of this flaw.\n\nSpecifically, the following `ipmi-oem` commands are vulnerable to this issue:\n\n- ipmi-oem dell get-last-post-code\n- ipmi-oem supermicro extra-firmware-info\n- ipmi-oem wistron read-proprietary-string\n\nDefault Red Hat Enterprise Linux security features, including SELinux enforcement, Address Space Layout Randomization (ASLR) and NX (No-Execute) stack protection, significantly increase the difficulty of achieving arbitrary code execution, limiting the impact of this vulnerability.\n\nDue to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33554"
},
{
"category": "external",
"summary": "RHBZ#2450778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33554",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33554"
},
{
"category": "external",
"summary": "https://ftp.gnu.org/gnu/freeipmi/",
"url": "https://ftp.gnu.org/gnu/freeipmi/"
},
{
"category": "external",
"summary": "https://savannah.gnu.org/bugs/?68140",
"url": "https://savannah.gnu.org/bugs/?68140"
},
{
"category": "external",
"summary": "https://savannah.gnu.org/bugs/?68141",
"url": "https://savannah.gnu.org/bugs/?68141"
},
{
"category": "external",
"summary": "https://savannah.gnu.org/bugs/?68142",
"url": "https://savannah.gnu.org/bugs/?68142"
}
],
"release_date": "2026-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-04T14:25:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13515"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure all BMCs and the servers running FreeIPMI are isolated on a dedicated and restricted network environment.",
"product_ids": [
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"AppStream-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"AppStream-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.src",
"CRB-10.1.Z:freeipmi-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-bmc-watchdog-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-debugsource-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-devel-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmidetectd-debuginfo-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-0:1.6.17-1.el10_1.x86_64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.aarch64",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.ppc64le",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.s390x",
"CRB-10.1.Z:freeipmi-ipmiseld-debuginfo-0:1.6.17-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "freeipmi: buffer overflows on response messages via ipmi-oem"
}
]
}
OPENSUSE-SU-2026:10436-1
Vulnerability from csaf_opensuse - Published: 2026-03-26 00:00 - Updated: 2026-03-26 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "freeipmi-1.6.17-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the freeipmi-1.6.17-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10436",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10436-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33554 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33554/"
}
],
"title": "freeipmi-1.6.17-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-26T00:00:00Z",
"generator": {
"date": "2026-03-26T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10436-1",
"initial_release_date": "2026-03-26T00:00:00Z",
"revision_history": [
{
"date": "2026-03-26T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.17-1.1.aarch64",
"product": {
"name": "freeipmi-1.6.17-1.1.aarch64",
"product_id": "freeipmi-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"product_id": "freeipmi-bmc-watchdog-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.17-1.1.aarch64",
"product": {
"name": "freeipmi-devel-1.6.17-1.1.aarch64",
"product_id": "freeipmi-devel-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"product": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"product_id": "freeipmi-ipmidetectd-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"product": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"product_id": "freeipmi-ipmiseld-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.17-1.1.aarch64",
"product": {
"name": "libfreeipmi17-1.6.17-1.1.aarch64",
"product_id": "libfreeipmi17-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.17-1.1.aarch64",
"product": {
"name": "libipmiconsole2-1.6.17-1.1.aarch64",
"product_id": "libipmiconsole2-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.17-1.1.aarch64",
"product": {
"name": "libipmidetect0-1.6.17-1.1.aarch64",
"product_id": "libipmidetect0-1.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.17-1.1.aarch64",
"product": {
"name": "libipmimonitoring6-1.6.17-1.1.aarch64",
"product_id": "libipmimonitoring6-1.6.17-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.17-1.1.ppc64le",
"product": {
"name": "freeipmi-1.6.17-1.1.ppc64le",
"product_id": "freeipmi-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"product_id": "freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.17-1.1.ppc64le",
"product": {
"name": "freeipmi-devel-1.6.17-1.1.ppc64le",
"product_id": "freeipmi-devel-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"product": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"product_id": "freeipmi-ipmidetectd-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"product": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"product_id": "freeipmi-ipmiseld-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.17-1.1.ppc64le",
"product": {
"name": "libfreeipmi17-1.6.17-1.1.ppc64le",
"product_id": "libfreeipmi17-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.17-1.1.ppc64le",
"product": {
"name": "libipmiconsole2-1.6.17-1.1.ppc64le",
"product_id": "libipmiconsole2-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.17-1.1.ppc64le",
"product": {
"name": "libipmidetect0-1.6.17-1.1.ppc64le",
"product_id": "libipmidetect0-1.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.17-1.1.ppc64le",
"product": {
"name": "libipmimonitoring6-1.6.17-1.1.ppc64le",
"product_id": "libipmimonitoring6-1.6.17-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.17-1.1.s390x",
"product": {
"name": "freeipmi-1.6.17-1.1.s390x",
"product_id": "freeipmi-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"product_id": "freeipmi-bmc-watchdog-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.17-1.1.s390x",
"product": {
"name": "freeipmi-devel-1.6.17-1.1.s390x",
"product_id": "freeipmi-devel-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"product": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"product_id": "freeipmi-ipmidetectd-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.17-1.1.s390x",
"product": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.s390x",
"product_id": "freeipmi-ipmiseld-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.17-1.1.s390x",
"product": {
"name": "libfreeipmi17-1.6.17-1.1.s390x",
"product_id": "libfreeipmi17-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.17-1.1.s390x",
"product": {
"name": "libipmiconsole2-1.6.17-1.1.s390x",
"product_id": "libipmiconsole2-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.17-1.1.s390x",
"product": {
"name": "libipmidetect0-1.6.17-1.1.s390x",
"product_id": "libipmidetect0-1.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.17-1.1.s390x",
"product": {
"name": "libipmimonitoring6-1.6.17-1.1.s390x",
"product_id": "libipmimonitoring6-1.6.17-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.17-1.1.x86_64",
"product": {
"name": "freeipmi-1.6.17-1.1.x86_64",
"product_id": "freeipmi-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"product_id": "freeipmi-bmc-watchdog-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.17-1.1.x86_64",
"product": {
"name": "freeipmi-devel-1.6.17-1.1.x86_64",
"product_id": "freeipmi-devel-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"product": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"product_id": "freeipmi-ipmidetectd-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"product": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"product_id": "freeipmi-ipmiseld-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.17-1.1.x86_64",
"product": {
"name": "libfreeipmi17-1.6.17-1.1.x86_64",
"product_id": "libfreeipmi17-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.17-1.1.x86_64",
"product": {
"name": "libipmiconsole2-1.6.17-1.1.x86_64",
"product_id": "libipmiconsole2-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.17-1.1.x86_64",
"product": {
"name": "libipmidetect0-1.6.17-1.1.x86_64",
"product_id": "libipmidetect0-1.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.17-1.1.x86_64",
"product": {
"name": "libipmimonitoring6-1.6.17-1.1.x86_64",
"product_id": "libipmimonitoring6-1.6.17-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-1.6.17-1.1.aarch64"
},
"product_reference": "freeipmi-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-1.6.17-1.1.ppc64le"
},
"product_reference": "freeipmi-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-1.6.17-1.1.s390x"
},
"product_reference": "freeipmi-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-1.6.17-1.1.x86_64"
},
"product_reference": "freeipmi-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.aarch64"
},
"product_reference": "freeipmi-devel-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.ppc64le"
},
"product_reference": "freeipmi-devel-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.s390x"
},
"product_reference": "freeipmi-devel-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.x86_64"
},
"product_reference": "freeipmi-devel-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.s390x"
},
"product_reference": "freeipmi-ipmiseld-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.aarch64"
},
"product_reference": "libfreeipmi17-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.ppc64le"
},
"product_reference": "libfreeipmi17-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.s390x"
},
"product_reference": "libfreeipmi17-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.x86_64"
},
"product_reference": "libfreeipmi17-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.aarch64"
},
"product_reference": "libipmiconsole2-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.ppc64le"
},
"product_reference": "libipmiconsole2-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.s390x"
},
"product_reference": "libipmiconsole2-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.x86_64"
},
"product_reference": "libipmiconsole2-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.aarch64"
},
"product_reference": "libipmidetect0-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.ppc64le"
},
"product_reference": "libipmidetect0-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.s390x"
},
"product_reference": "libipmidetect0-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.x86_64"
},
"product_reference": "libipmidetect0-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.aarch64"
},
"product_reference": "libipmimonitoring6-1.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.ppc64le"
},
"product_reference": "libipmimonitoring6-1.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.s390x"
},
"product_reference": "libipmimonitoring6-1.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.x86_64"
},
"product_reference": "libipmimonitoring6-1.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33554"
}
],
"notes": [
{
"category": "general",
"text": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33554",
"url": "https://www.suse.com/security/cve/CVE-2026-33554"
},
{
"category": "external",
"summary": "SUSE Bug 1260414 for CVE-2026-33554",
"url": "https://bugzilla.suse.com/1260414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-bmc-watchdog-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-devel-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmidetectd-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:freeipmi-ipmiseld-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libfreeipmi17-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmiconsole2-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmidetect0-1.6.17-1.1.x86_64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.aarch64",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.s390x",
"openSUSE Tumbleweed:libipmimonitoring6-1.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-33554"
}
]
}
CERTFR-2026-AVI-0406
Vulnerability from certfr_avis - Published: 2026-04-08 - Updated: 2026-04-08
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | azl3 python-ecdsa 0.18.0-2 versions antérieures à 0.19.2-1 | ||
| Microsoft | N/A | azl3 freeipmi 1.6.11-1 versions antérieures à 1.6.17-1 | ||
| Microsoft | N/A | azl3 kernel 6.6.130.1-3 versions antérieures à 6.6.130.1-3 | ||
| Microsoft | N/A | azl3 nodejs 20.14.0-14 versions antérieures à 20.14.0-15 | ||
| Microsoft | N/A | azl3 gdk-pixbuf2 2.42.10-4 versions antérieures à 2.42.10-5 | ||
| Microsoft | N/A | azl3 vim 9.2.0240-1 versions antérieures à 9.2.0315-1 | ||
| Microsoft | N/A | azl3 telegraf 1.31.0-17 versions antérieures à 1.31.0-18 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 python-ecdsa 0.18.0-2 versions ant\u00e9rieures \u00e0 0.19.2-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 freeipmi 1.6.11-1 versions ant\u00e9rieures \u00e0 1.6.17-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.130.1-3 versions ant\u00e9rieures \u00e0 6.6.130.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nodejs 20.14.0-14 versions ant\u00e9rieures \u00e0 20.14.0-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 gdk-pixbuf2 2.42.10-4 versions ant\u00e9rieures \u00e0 2.42.10-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 vim 9.2.0240-1 versions ant\u00e9rieures \u00e0 9.2.0315-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 telegraf 1.31.0-17 versions ant\u00e9rieures \u00e0 1.31.0-18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-34714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34714"
},
{
"name": "CVE-2026-33936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33936"
},
{
"name": "CVE-2026-34982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34982"
},
{
"name": "CVE-2026-33554",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33554"
},
{
"name": "CVE-2026-5201",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5201"
},
{
"name": "CVE-2026-31394",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31394"
},
{
"name": "CVE-2026-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21715"
},
{
"name": "CVE-2026-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21716"
},
{
"name": "CVE-2026-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21714"
},
{
"name": "CVE-2026-33216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33216"
},
{
"name": "CVE-2026-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21713"
},
{
"name": "CVE-2026-35177",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35177"
},
{
"name": "CVE-2026-29785",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29785"
},
{
"name": "CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
}
],
"initial_release_date": "2026-04-08T00:00:00",
"last_revision_date": "2026-04-08T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0406",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33554",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33554"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-34982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34982"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33936",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33936"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21714"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21710",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21710"
},
{
"published_at": "2026-04-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-31394",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31394"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-29785",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29785"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-5201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5201"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21713"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33216",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33216"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21715"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21716"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-34714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34714"
},
{
"published_at": "2026-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-35177",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35177"
}
]
}
GHSA-382W-Q5P9-3F2H
Vulnerability from github – Published: 2026-03-24 15:30 – Updated: 2026-03-24 21:31ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
{
"affected": [],
"aliases": [
"CVE-2026-33554"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-24T15:16:35Z",
"severity": "HIGH"
},
"details": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
"id": "GHSA-382w-q5p9-3f2h",
"modified": "2026-03-24T21:31:23Z",
"published": "2026-03-24T15:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33554"
},
{
"type": "WEB",
"url": "https://ftp.gnu.org/gnu/freeipmi"
},
{
"type": "WEB",
"url": "https://savannah.gnu.org/bugs/?68140"
},
{
"type": "WEB",
"url": "https://savannah.gnu.org/bugs/?68141"
},
{
"type": "WEB",
"url": "https://savannah.gnu.org/bugs/?68142"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2026:21212-1
Vulnerability from csaf_suse - Published: 2026-04-17 08:18 - Updated: 2026-04-17 08:18| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeipmi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeipmi fixes the following issue:\n\n- CVE-2026-33554: improper memory handling and data validation can lead to stack buffer overflows and acceptance of\n malformed payloads/responses (bsc#1260414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-579",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21212-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21212-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621212-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21212-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025493.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260414",
"url": "https://bugzilla.suse.com/1260414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33554 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33554/"
}
],
"title": "Security update for freeipmi",
"tracking": {
"current_release_date": "2026-04-17T08:18:02Z",
"generator": {
"date": "2026-04-17T08:18:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21212-1",
"initial_release_date": "2026-04-17T08:18:02Z",
"revision_history": [
{
"date": "2026-04-17T08:18:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.15-160000.3.1.aarch64",
"product": {
"name": "freeipmi-1.6.15-160000.3.1.aarch64",
"product_id": "freeipmi-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"product_id": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.15-160000.3.1.aarch64",
"product": {
"name": "freeipmi-devel-1.6.15-160000.3.1.aarch64",
"product_id": "freeipmi-devel-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"product": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"product_id": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"product": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"product_id": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.15-160000.3.1.aarch64",
"product": {
"name": "libipmiconsole2-1.6.15-160000.3.1.aarch64",
"product_id": "libipmiconsole2-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.15-160000.3.1.aarch64",
"product": {
"name": "libipmidetect0-1.6.15-160000.3.1.aarch64",
"product_id": "libipmidetect0-1.6.15-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"product": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"product_id": "libipmimonitoring6-1.6.15-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "freeipmi-1.6.15-160000.3.1.ppc64le",
"product_id": "freeipmi-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"product_id": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"product_id": "freeipmi-devel-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"product_id": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"product_id": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"product_id": "libipmiconsole2-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "libipmidetect0-1.6.15-160000.3.1.ppc64le",
"product_id": "libipmidetect0-1.6.15-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"product": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"product_id": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.15-160000.3.1.s390x",
"product": {
"name": "freeipmi-1.6.15-160000.3.1.s390x",
"product_id": "freeipmi-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"product_id": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.15-160000.3.1.s390x",
"product": {
"name": "freeipmi-devel-1.6.15-160000.3.1.s390x",
"product_id": "freeipmi-devel-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"product": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"product_id": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"product": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"product_id": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.s390x",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.s390x",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.15-160000.3.1.s390x",
"product": {
"name": "libipmiconsole2-1.6.15-160000.3.1.s390x",
"product_id": "libipmiconsole2-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.15-160000.3.1.s390x",
"product": {
"name": "libipmidetect0-1.6.15-160000.3.1.s390x",
"product_id": "libipmidetect0-1.6.15-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.15-160000.3.1.s390x",
"product": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.s390x",
"product_id": "libipmimonitoring6-1.6.15-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeipmi-1.6.15-160000.3.1.x86_64",
"product": {
"name": "freeipmi-1.6.15-160000.3.1.x86_64",
"product_id": "freeipmi-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"product": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"product_id": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-devel-1.6.15-160000.3.1.x86_64",
"product": {
"name": "freeipmi-devel-1.6.15-160000.3.1.x86_64",
"product_id": "freeipmi-devel-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"product": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"product_id": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"product": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"product_id": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmiconsole2-1.6.15-160000.3.1.x86_64",
"product": {
"name": "libipmiconsole2-1.6.15-160000.3.1.x86_64",
"product_id": "libipmiconsole2-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmidetect0-1.6.15-160000.3.1.x86_64",
"product": {
"name": "libipmidetect0-1.6.15-160000.3.1.x86_64",
"product_id": "libipmidetect0-1.6.15-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"product": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"product_id": "libipmimonitoring6-1.6.15-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-devel-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-devel-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64"
},
"product_reference": "freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmiconsole2-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmiconsole2-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmidetect0-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmidetect0-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libipmimonitoring6-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33554"
}
],
"notes": [
{
"category": "general",
"text": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33554",
"url": "https://www.suse.com/security/cve/CVE-2026-33554"
},
{
"category": "external",
"summary": "SUSE Bug 1260414 for CVE-2026-33554",
"url": "https://bugzilla.suse.com/1260414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-bmc-watchdog-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-devel-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmidetectd-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:freeipmi-ipmiseld-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libfreeipmi17-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmiconsole2-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmidetect0-1.6.15-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libipmimonitoring6-1.6.15-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T08:18:02Z",
"details": "important"
}
],
"title": "CVE-2026-33554"
}
]
}
SUSE-SU-2026:21231-1
Vulnerability from csaf_suse - Published: 2026-04-17 08:18 - Updated: 2026-04-17 08:18| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeipmi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeipmi fixes the following issue:\n\n- CVE-2026-33554: improper memory handling and data validation can lead to stack buffer overflows and acceptance of\n malformed payloads/responses (bsc#1260414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-579",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21231-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21231-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621231-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21231-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045859.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260414",
"url": "https://bugzilla.suse.com/1260414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33554 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33554/"
}
],
"title": "Security update for freeipmi",
"tracking": {
"current_release_date": "2026-04-17T08:18:30Z",
"generator": {
"date": "2026-04-17T08:18:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21231-1",
"initial_release_date": "2026-04-17T08:18:30Z",
"revision_history": [
{
"date": "2026-04-17T08:18:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"product": {
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"product_id": "libfreeipmi17-1.6.15-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.aarch64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.15-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.x86_64"
},
"product_reference": "libfreeipmi17-1.6.15-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33554"
}
],
"notes": [
{
"category": "general",
"text": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33554",
"url": "https://www.suse.com/security/cve/CVE-2026-33554"
},
{
"category": "external",
"summary": "SUSE Bug 1260414 for CVE-2026-33554",
"url": "https://bugzilla.suse.com/1260414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libfreeipmi17-1.6.15-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T08:18:30Z",
"details": "important"
}
],
"title": "CVE-2026-33554"
}
]
}
SUSE-SU-2026:21446-1
Vulnerability from csaf_suse - Published: 2026-04-27 12:27 - Updated: 2026-04-27 12:27| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeipmi",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeipmi fixes the following issue:\n\n- CVE-2026-33554: improper memory handling and data validation can lead to stack buffer overflows and acceptance of\n malformed payloads/responses (bsc#1260414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-512",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21446-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21446-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621446-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21446-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-May/025808.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260414",
"url": "https://bugzilla.suse.com/1260414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33554 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33554/"
}
],
"title": "Security update for freeipmi",
"tracking": {
"current_release_date": "2026-04-27T12:27:43Z",
"generator": {
"date": "2026-04-27T12:27:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21446-1",
"initial_release_date": "2026-04-27T12:27:43Z",
"revision_history": [
{
"date": "2026-04-27T12:27:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"product": {
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"product_id": "libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64",
"product": {
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64",
"product_id": "libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64"
},
"product_reference": "libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64"
},
"product_reference": "libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33554"
}
],
"notes": [
{
"category": "general",
"text": "ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: \"ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers,\" \"ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers,\" and \"ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33554",
"url": "https://www.suse.com/security/cve/CVE-2026-33554"
},
{
"category": "external",
"summary": "SUSE Bug 1260414 for CVE-2026-33554",
"url": "https://bugzilla.suse.com/1260414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libfreeipmi17-1.6.14-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-27T12:27:43Z",
"details": "important"
}
],
"title": "CVE-2026-33554"
}
]
}
MSRC_CVE-2026-33554
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-04-08 01:38| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33554 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33554.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "CVE-2026-33554",
"tracking": {
"current_release_date": "2026-04-08T01:38:36.000Z",
"generator": {
"date": "2026-04-08T07:12:41.742Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-33554",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-02T01:04:20.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-02T14:38:17.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-04-08T01:38:36.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 freeipmi 1.6.6-3",
"product": {
"name": "cbl2 freeipmi 1.6.6-3",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 freeipmi 1.6.11-1",
"product": {
"name": "\u003cazl3 freeipmi 1.6.11-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 freeipmi 1.6.11-1",
"product": {
"name": "azl3 freeipmi 1.6.11-1",
"product_id": "21158"
}
}
],
"category": "product_name",
"name": "freeipmi"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 freeipmi 1.6.6-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 freeipmi 1.6.11-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 freeipmi 1.6.11-1 as a component of Azure Linux 3.0",
"product_id": "21158-17084"
},
"product_reference": "21158",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33554",
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"21158-17084"
],
"known_affected": [
"17086-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33554 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33554.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-02T01:04:20.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
},
{
"category": "vendor_fix",
"date": "2026-04-02T01:04:20.000Z",
"details": "1.6.17-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-2",
"17084-1"
]
}
],
"title": "CVE-2026-33554"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.