Simon Diepold discovered that U-Boot incorrectly handled certain DHCP responses. An attacker on the local network could possibly use this issue to obtain sensitive memory contents. (CVE-2024-42040)
It was discovered that U-Boot incorrectly handled symlink size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57254)
It was discovered that U-Boot incorrectly handled inode size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57255)
It was discovered that U-Boot incorrectly handled inode size calculations in EXT4 file systems. An attacker could use this issue with a specially crafted EXT4 file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57256)
It was discovered that U-Boot incorrectly handled deep symlink nesting in squashfs file systems. An attacker could possibly use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service. (CVE-2024-57257)
It was discovered that U-Boot incorrectly handled memory allocation in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57258)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "u-boot",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-amlogic",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-exynos",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-imx",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-microchip",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-mvebu",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-omap",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-qcom",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-qemu",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-rockchip",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-rpi",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-sifive",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-sunxi",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-tegra",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
},
{
"binary_name": "u-boot-tools",
"binary_version": "2022.01+dfsg-2ubuntu2.7"
}
]
}
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"id": "CVE-2024-57254",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57255",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57256",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57257",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57258",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57259",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8056-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "u-boot-amlogic",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-amlogic-binaries",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-asahi",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-exynos",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-exynos-binaries",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-imx",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-microchip",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-mvebu",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-omap",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-qcom",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-qemu",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-rockchip",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-rpi",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-sifive",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-sitara-binaries",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-starfive",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-stm32",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-sunxi",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-tegra",
"binary_version": "2025.10-0ubuntu0.24.04.2"
},
{
"binary_name": "u-boot-tools",
"binary_version": "2025.10-0ubuntu0.24.04.2"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"id": "CVE-2024-57254",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57255",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57256",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57257",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57258",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-57259",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8056-1.json"