Home / mailings [USN-8056-1] U-Boot vulnerabilities
Posted on 23 February 2026
Ubuntu Security==========================================================================Ubuntu Security Notice USN-8056-1
February 23, 2026
u-boot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in U-Boot.
Software Description:
- u-boot: A boot loader for embedded systems
Details:
Simon Diepold discovered that U-Boot incorrectly handled certain DHCP
responses. An attacker on the local network could possibly use this issue
to obtain sensitive memory contents. (CVE-2024-42040)
It was discovered that U-Boot incorrectly handled symlink size calculations
in squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57254)
It was discovered that U-Boot incorrectly handled inode size calculations
in squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57255)
It was discovered that U-Boot incorrectly handled inode size calculations
in EXT4 file systems. An attacker could use this issue with a specially
crafted EXT4 file system to cause U-Boot to crash, resulting in a denial of
service, or execute arbitrary code. (CVE-2024-57256)
It was discovered that U-Boot incorrectly handled deep symlink nesting in
squashfs file systems. An attacker could possibly use this issue with a
specially crafted squashfs file system to cause U-Boot to crash, resulting
in a denial of service. (CVE-2024-57257)
It was discovered that U-Boot incorrectly handled memory allocation in
squashfs file systems. An attacker could use this issue with a specially
crafted squashfs file system to cause U-Boot to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2024-57258)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
u-boot-amlogic 2025.10-0ubuntu0.24.04.2
u-boot-asahi 2025.10-0ubuntu0.24.04.2
u-boot-exynos 2025.10-0ubuntu0.24.04.2
u-boot-imx 2025.10-0ubuntu0.24.04.2
u-boot-microchip 2025.10-0ubuntu0.24.04.2
u-boot-mvebu 2025.10-0ubuntu0.24.04.2
u-boot-omap 2025.10-0ubuntu0.24.04.2
u-boot-qcom 2025.10-0ubuntu0.24.04.2
u-boot-qemu 2025.10-0ubuntu0.24.04.2
u-boot-rockchip 2025.10-0ubuntu0.24.04.2
u-boot-rpi 2025.10-0ubuntu0.24.04.2
u-boot-sifive 2025.10-0ubuntu0.24.04.2
u-boot-sitara-binaries 2025.10-0ubuntu0.24.04.2
u-boot-starfive 2025.10-0ubuntu0.24.04.2
u-boot-stm32 2025.10-0ubuntu0.24.04.2
u-boot-sunxi 2025.10-0ubuntu0.24.04.2
u-boot-tegra 2025.10-0ubuntu0.24.04.2
u-boot-tools 2025.10-0ubuntu0.24.04.2
Ubuntu 22.04 LTS
u-boot 2022.01+dfsg-2ubuntu2.7
u-boot-amlogic 2022.01+dfsg-2ubuntu2.7
u-boot-exynos 2022.01+dfsg-2ubuntu2.7
u-boot-imx 2022.01+dfsg-2ubuntu2.7
u-boot-microchip 2022.01+dfsg-2ubuntu2.7
u-boot-mvebu 2022.01+dfsg-2ubuntu2.7
u-boot-omap 2022.01+dfsg-2ubuntu2.7
u-boot-qcom 2022.01+dfsg-2ubuntu2.7
u-boot-qemu 2022.01+dfsg-2ubuntu2.7
u-boot-rockchip 2022.01+dfsg-2ubuntu2.7
u-boot-rpi 2022.01+dfsg-2ubuntu2.7
u-boot-sifive 2022.01+dfsg-2ubuntu2.7
u-boot-sunxi 2022.01+dfsg-2ubuntu2.7
u-boot-tegra 2022.01+dfsg-2ubuntu2.7
u-boot-tools 2022.01+dfsg-2ubuntu2.7
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8056-1
CVE-2024-57254, CVE-2024-57255, CVE-2024-57256, CVE-2024-57257,
CVE-2024-57258, CVE-2024-57259
Package Information:
https://launchpad.net/ubuntu/+source/u-boot/2025.10-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.7
--===============6705447605077891392==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
