========================================================================== Ubuntu Security Notice USN-8056-1 February 23, 2026
u-boot vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in U-Boot. Software Description: - u-boot: A boot loader for embedded systems Details: Simon Diepold discovered that U-Boot incorrectly handled certain DHCP responses. An attacker on the local network could possibly use this issue to obtain sensitive memory contents. (CVE-2024-42040) It was discovered that U-Boot incorrectly handled symlink size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57254) It was discovered that U-Boot incorrectly handled inode size calculations in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57255) It was discovered that U-Boot incorrectly handled inode size calculations in EXT4 file systems. An attacker could use this issue with a specially crafted EXT4 file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57256) It was discovered that U-Boot incorrectly handled deep symlink nesting in squashfs file systems. An attacker could possibly use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service. (CVE-2024-57257) It was discovered that U-Boot incorrectly handled memory allocation in squashfs file systems. An attacker could use this issue with a specially crafted squashfs file system to cause U-Boot to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2024-57258) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS u-boot-amlogic 2025.10-0ubuntu0.24.04.2 u-boot-asahi 2025.10-0ubuntu0.24.04.2 u-boot-exynos 2025.10-0ubuntu0.24.04.2 u-boot-imx 2025.10-0ubuntu0.24.04.2 u-boot-microchip 2025.10-0ubuntu0.24.04.2 u-boot-mvebu 2025.10-0ubuntu0.24.04.2 u-boot-omap 2025.10-0ubuntu0.24.04.2 u-boot-qcom 2025.10-0ubuntu0.24.04.2 u-boot-qemu 2025.10-0ubuntu0.24.04.2 u-boot-rockchip 2025.10-0ubuntu0.24.04.2 u-boot-rpi 2025.10-0ubuntu0.24.04.2 u-boot-sifive 2025.10-0ubuntu0.24.04.2 u-boot-sitara-binaries 2025.10-0ubuntu0.24.04.2 u-boot-starfive 2025.10-0ubuntu0.24.04.2 u-boot-stm32 2025.10-0ubuntu0.24.04.2 u-boot-sunxi 2025.10-0ubuntu0.24.04.2 u-boot-tegra 2025.10-0ubuntu0.24.04.2 u-boot-tools 2025.10-0ubuntu0.24.04.2 Ubuntu 22.04 LTS u-boot 2022.01+dfsg-2ubuntu2.7 u-boot-amlogic 2022.01+dfsg-2ubuntu2.7 u-boot-exynos 2022.01+dfsg-2ubuntu2.7 u-boot-imx 2022.01+dfsg-2ubuntu2.7 u-boot-microchip 2022.01+dfsg-2ubuntu2.7 u-boot-mvebu 2022.01+dfsg-2ubuntu2.7 u-boot-omap 2022.01+dfsg-2ubuntu2.7 u-boot-qcom 2022.01+dfsg-2ubuntu2.7 u-boot-qemu 2022.01+dfsg-2ubuntu2.7 u-boot-rockchip 2022.01+dfsg-2ubuntu2.7 u-boot-rpi 2022.01+dfsg-2ubuntu2.7 u-boot-sifive 2022.01+dfsg-2ubuntu2.7 u-boot-sunxi 2022.01+dfsg-2ubuntu2.7 u-boot-tegra 2022.01+dfsg-2ubuntu2.7 u-boot-tools 2022.01+dfsg-2ubuntu2.7 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8056-1 CVE-2024-57254, CVE-2024-57255, CVE-2024-57256, CVE-2024-57257, CVE-2024-57258, CVE-2024-57259 Package Information: https://launchpad.net/ubuntu/+source/u-boot/2025.10-0ubuntu0.24.04.2 https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.7
signature.asc
Description: OpenPGP digital signature
