{"schema_version":"1.7.2","id":"OESA-2024-2290","modified":"2024-10-25T11:09:26Z","published":"2024-10-25T11:09:26Z","upstream":["CVE-2024-42934"],"summary":"OpenIPMI security update","details":"This is the OpenIPMI library, a library that makes simplifies building complex IPMI management software.IPMI is a specification detailing how to detect and manage sensors in a system.  It also specifies some chassis-level thing like power control,reset, FRU (Field Replaceable Unit) information, and watchdogs.\r\n\r\nSecurity Fix(es):\r\n\r\nOpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution.(CVE-2024-42934)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"OpenIPMI","purl":"pkg:rpm/openEuler/OpenIPMI\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.32-4.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["OpenIPMI-2.0.32-4.oe2203sp4.aarch64.rpm","OpenIPMI-debuginfo-2.0.32-4.oe2203sp4.aarch64.rpm","OpenIPMI-debugsource-2.0.32-4.oe2203sp4.aarch64.rpm","OpenIPMI-devel-2.0.32-4.oe2203sp4.aarch64.rpm","OpenIPMI-perl-2.0.32-4.oe2203sp4.aarch64.rpm","python3-openipmi-2.0.32-4.oe2203sp4.aarch64.rpm"],"noarch":["OpenIPMI-help-2.0.32-4.oe2203sp4.noarch.rpm"],"src":["OpenIPMI-2.0.32-4.oe2203sp4.src.rpm"],"x86_64":["OpenIPMI-2.0.32-4.oe2203sp4.x86_64.rpm","OpenIPMI-debuginfo-2.0.32-4.oe2203sp4.x86_64.rpm","OpenIPMI-debugsource-2.0.32-4.oe2203sp4.x86_64.rpm","OpenIPMI-devel-2.0.32-4.oe2203sp4.x86_64.rpm","OpenIPMI-perl-2.0.32-4.oe2203sp4.x86_64.rpm","python3-openipmi-2.0.32-4.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42934"}],"database_specific":{"severity":"Medium"}}