Simon Diepold discovered that U-Boot incorrectly handled certain DHCP responses. An attacker on the local network could possibly use this issue to obtain sensitive memory contents. (CVE-2024-42040)
It was discovered that U-Boot incorrectly handled symlink size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57254)
It was discovered that U-Boot incorrectly handled inode size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57255)
It was discovered that U-Boot incorrectly handled inode size calculations in EXT4 file systems. An attacker could use this issue with a specially crafted EXT4 file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57256)
It was discovered that U-Boot incorrectly handled deep symlink nesting in squashfs file systems. An attacker could possibly use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service. (CVE-2024-57257)
It was discovered that U-Boot incorrectly handled memory allocation in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57258)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-amlogic"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-exynos"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-imx"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-microchip"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-mvebu"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-omap"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-qcom"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-qemu"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-rockchip"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-rpi"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-sifive"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-sunxi"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-tegra"
},
{
"binary_version": "2022.01+dfsg-2ubuntu2.7",
"binary_name": "u-boot-tools"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8056-1.json"
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57254"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57255"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57256"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57257"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57258"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57259"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-amlogic"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-amlogic-binaries"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-asahi"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-exynos"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-exynos-binaries"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-imx"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-microchip"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-mvebu"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-omap"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-qcom"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-qemu"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-rockchip"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-rpi"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-sifive"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-sitara-binaries"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-starfive"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-stm32"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-sunxi"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-tegra"
},
{
"binary_version": "2025.10-0ubuntu0.24.04.2",
"binary_name": "u-boot-tools"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8056-1.json"
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57254"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57255"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57256"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57257"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57258"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2024-57259"
}
]
}