Cyber Posture

CVE-2024-57256

High

Published: 18 February 2025

Published
18 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 18.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1 occurs for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.

Security Summary

CVE-2024-57256 is an integer overflow vulnerability (CWE-190) in the ext4fs_read_symlink function within Das U-Boot versions prior to 2025.01-rc1. The issue arises when processing a crafted ext4 filesystem featuring an inode size of 0xffffffff, which causes an overflow during a zalloc operation that adds one to an le32 variable. This results in a malloc allocation of zero bytes, enabling a subsequent memory overwrite.

Exploitation requires physical access to the target device (AV:P) and involves high attack complexity (AC:H), with no privileges (PR:N) or user interaction (UI:N) needed. The attack has a changed scope (S:C) and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), scoring 7.1 under CVSS 3.1. A successful exploit could allow an attacker to overwrite memory, potentially leading to arbitrary code execution or system compromise on affected U-Boot bootloaders.

Mitigation is addressed in a commit (35f75d2a46e5859138c83a75cd2f4141c5479ab9) in the U-Boot repository, which users should apply by updating to Das U-Boot 2025.01-rc1 or later. Announcements on oss-security (2025/02/17) detail the vulnerability disclosure, while Debian LTS tracking (2025/05) indicates backported fixes for affected distributions. Security practitioners should verify bootloader versions in embedded or boot environments and test crafted filesystem inputs during validation.

Details

CWE(s)
CWE-190

Affected Products

denx
u-boot
≤ 2024.10

References