Home / mailingsPDF  

[USN-8056-1] U-Boot vulnerabilities

Posted on 23 February 2026
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-8056-1
February 23, 2026

u-boot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in U-Boot.

Software Description:
- u-boot: A boot loader for embedded systems

Details:

Simon Diepold discovered that U-Boot incorrectly handled certain DHCP
responses. An attacker on the local network could possibly use this issue
to obtain sensitive memory contents. (CVE-2024-42040)

It was discovered that U-Boot incorrectly handled symlink size calculations
in squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57254)

It was discovered that U-Boot incorrectly handled inode size calculations
in squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57255)

It was discovered that U-Boot incorrectly handled inode size calculations
in EXT4 file systems. An attacker could use this issue with a specially
crafted EXT4 file system to cause U-Boot to crash, resulting in a denial of
service, or execute arbitrary code. (CVE-2024-57256)

It was discovered that U-Boot incorrectly handled deep symlink nesting in
squashfs file systems. An attacker could possibly use this issue with a
specially crafted squashfs file system to cause U-Boot to crash, resulting
in a denial of service. (CVE-2024-57257)

It was discovered that U-Boot incorrectly handled memory allocation in
squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57258)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
u-boot-amlogic 2025.10-0ubuntu0.24.04.2
u-boot-asahi 2025.10-0ubuntu0.24.04.2
u-boot-exynos 2025.10-0ubuntu0.24.04.2
u-boot-imx 2025.10-0ubuntu0.24.04.2
u-boot-microchip 2025.10-0ubuntu0.24.04.2
u-boot-mvebu 2025.10-0ubuntu0.24.04.2
u-boot-omap 2025.10-0ubuntu0.24.04.2
u-boot-qcom 2025.10-0ubuntu0.24.04.2
u-boot-qemu 2025.10-0ubuntu0.24.04.2
u-boot-rockchip 2025.10-0ubuntu0.24.04.2
u-boot-rpi 2025.10-0ubuntu0.24.04.2
u-boot-sifive 2025.10-0ubuntu0.24.04.2
u-boot-sitara-binaries 2025.10-0ubuntu0.24.04.2
u-boot-starfive 2025.10-0ubuntu0.24.04.2
u-boot-stm32 2025.10-0ubuntu0.24.04.2
u-boot-sunxi 2025.10-0ubuntu0.24.04.2
u-boot-tegra 2025.10-0ubuntu0.24.04.2
u-boot-tools 2025.10-0ubuntu0.24.04.2

Ubuntu 22.04 LTS
u-boot 2022.01+dfsg-2ubuntu2.7
u-boot-amlogic 2022.01+dfsg-2ubuntu2.7
u-boot-exynos 2022.01+dfsg-2ubuntu2.7
u-boot-imx 2022.01+dfsg-2ubuntu2.7
u-boot-microchip 2022.01+dfsg-2ubuntu2.7
u-boot-mvebu 2022.01+dfsg-2ubuntu2.7
u-boot-omap 2022.01+dfsg-2ubuntu2.7
u-boot-qcom 2022.01+dfsg-2ubuntu2.7
u-boot-qemu 2022.01+dfsg-2ubuntu2.7
u-boot-rockchip 2022.01+dfsg-2ubuntu2.7
u-boot-rpi 2022.01+dfsg-2ubuntu2.7
u-boot-sifive 2022.01+dfsg-2ubuntu2.7
u-boot-sunxi 2022.01+dfsg-2ubuntu2.7
u-boot-tegra 2022.01+dfsg-2ubuntu2.7
u-boot-tools 2022.01+dfsg-2ubuntu2.7

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8056-1
CVE-2024-57254, CVE-2024-57255, CVE-2024-57256, CVE-2024-57257,
CVE-2024-57258, CVE-2024-57259

Package Information:
https://launchpad.net/ubuntu/+source/u-boot/2025.10-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.7

--===============6705447605077891392==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP