openSUSE has issued an advisory on March 29: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CMUSXA2JYCKVIWVK4S4VIC7PKTX2BCXY/
Fixed by: https://cgit.git.savannah.gnu.org/cgit/freeipmi.git/commit/?id=b03ca4d1bff4626c11db8684564b88cd26a2425d
Whiteboard: (none) => MGA9TOOFlags: (none) => affects_mga9+CVE: (none) => CVE-2026-33554Source RPM: (none) => freeipmi-1.6.16-1.mga10.src.rpm, freeipmi-1.6.10-2.mga9.src.rpmStatus comment: (none) => Fixed upstream in 1.6.17 and patch available from upstream
For Cauldron, freeipmi-1.6.16-2.mga10 fixes the issue. Suggested advisory: ======================== The updated packages fix a security vulnerability: ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. (CVE-2026-33554) References: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CMUSXA2JYCKVIWVK4S4VIC7PKTX2BCXY/ ======================== Updated packages in core/updates_testing: ======================== freeipmi-1.6.10-2.1.mga9 freeipmi-fish-1.6.10-2.1.mga9 freeipmi-utils-1.6.10-2.1.mga9 lib(64)freeipmi-devel-1.6.10-2.1.mga9 lib(64)freeipmi17-1.6.10-2.1.mga9 lib(64)ipmiconsole2-1.6.10-2.1.mga9 lib(64)ipmidetect0-1.6.10-2.1.mga9 lib(64)ipmimonitoring6-1.6.10-2.1.mga9 from SRPM: freeipmi-1.6.10-2.1.mga9.src.rpm
Status comment: Fixed upstream in 1.6.17 and patch available from upstream => (none)Assignee: bugsquad => qa-bugsWhiteboard: MGA9TOO => (none)Version: Cauldron => 9Flags: affects_mga9+ => (none)Source RPM: freeipmi-1.6.16-1.mga10.src.rpm, freeipmi-1.6.10-2.mga9.src.rpm => freeipmi-1.6.10-2.mga9.src.rpmStatus: NEW => ASSIGNED
Keywords: (none) => advisory
installing freeipmi-1.6.10-2.1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ################################################################################################### 1/1: freeipmi ################################################################################################### 1/1: removing freeipmi-1.6.10-2.mga9.x86_64 ################################################################################################### [root@jgrey ~]# LC_ALL=C urpmi freeipmi-utils To satisfy dependencies, the following packages are going to be installed: Package Version Release Arch (medium "QA Testing (64-bit)") freeipmi-utils 1.6.10 2.1.mga9 x86_64 lib64freeipmi17 1.6.10 2.1.mga9 x86_64 lib64ipmiconsole2 1.6.10 2.1.mga9 x86_64 lib64ipmidetect0 1.6.10 2.1.mga9 x86_64 8.1MB of additional disk space will be used. 1.6MB of packages will be retrieved. Proceed with the installation of the 4 packages? (Y/n) y installing lib64freeipmi17-1.6.10-2.1.mga9.x86_64.rpm freeipmi-utils-1.6.10-2.1.mga9.x86_64.rpm lib64ipmiconsole2-1.6.10-2.1.mga9.x86_64.rpm lib64ipmidetect0-1.6.10-2.1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ################################################################################################### 1/4: lib64freeipmi17 ################################################################################################### 2/4: lib64ipmiconsole2 ################################################################################################### 3/4: lib64ipmidetect0 ################################################################################################### 4/4: freeipmi-utils ################################################################################################### Let in clean install feel free to provide other test
MGA9-64 server Plasma Wayland on Compaq H000SB. No installation issues. Have been googling arounr to find a simple test, but ipmi seems to be an ecosystem on its own, where these packages are only part of. So IMHO, I agree to let go
Flags: (none) => test_passed_mga9_64+CC: (none) => herman.viaeneWhiteboard: (none) => MGA9-64-OK
Validating.
Keywords: (none) => validated_updateCC: (none) => andrewsfarm, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2026-0078.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED