On Tue, May 12, 2026 at 11:39:32AM +0100, Paul Barker wrote:
> Hi folks,
> 
> We recently had a patch sent to Yocto Project to backport a fix for
> CVE-2025-24857 to our Scarthgap branch which uses U-Boot 2024.01.
> Looking at the CVE info, this has confused me a lot. It says [1]:
> 
>   Improper access control for volatile memory containing boot code in
>   Universal Boot Loader (U-Boot) before 2017.11 and Qualcomm chips
>   IPQ4019, IPQ5018, IPQ5322, IPQ6018, IPQ8064, IPQ8074, and IPQ9574
>   could allow an attacker to execute arbitrary code.
> 
> The NVD page says it affects U-Boot "Up to (excluding) 2017.11".
> 
> But, the patch that says it addresses CVE-2025-24867 was committed to
> U-Boot in December 2025 [2]. The first release containing this patch was
> v2026.01.
> 
> Is this commit actually needed to resolve that CVE? Or is it some other
> change back in 2017 that fixed the issue? (A yes/no is fine, I don't
> need a link to the exact commit)
> 
> [1]: https://nvd.nist.gov/vuln/detail/CVE-2025-24857
> [2]: 
> https://source.denx.de/u-boot/u-boot/-/commit/87d85139a96a39429120cca838e739408ef971a2

This is a "funny" one. The reference to v2017.11 is due to when we had a
large rework of the FAT code and so the most obvious way to trigger the
problem was removed. The changes in commit 87d85139a96a ("fs: fat:
Perform sanity checks on getsize in get_fatent()") may, or may not, be
only a sanity check against performing similar attacks. So yes, it would
make sense for Scarthgap to have this change.

-- 
Tom

Attachment: signature.asc
Description: PGP signature

Reply via email to