Vulnerability Details : CVE-2024-57258
Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64.
Products affected by CVE-2024-57258
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-57258
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-57258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
0.5
|
6.0
|
MITRE | 2025-02-19 |
CWE ids for CVE-2024-57258
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: cve@mitre.org (Secondary)
References for CVE-2024-57258
-
https://www.openwall.com/lists/oss-security/2025/02/17/2
oss-security - Multiple Vulnerabilities in U-Boot
-
https://source.denx.de/u-boot/u-boot/-/commit/c17b2a05dd50a3ba437e6373093a0d6a359cdee0
x86: Fix ptrdiff_t for x86_64 (c17b2a05) · Commits · U-Boot / U-Boot · GitLab
-
https://source.denx.de/u-boot/u-boot/-/commit/0a10b49206a29b4aa2f80233a3e53ca0466bb0b3
dlmalloc: Fix integer overflow in sbrk() (0a10b492) · Commits · U-Boot / U-Boot · GitLab
-
https://source.denx.de/u-boot/u-boot/-/commit/8642b2178d2c4002c99a0b69a845a48f2ae2706f
dlmalloc: Fix integer overflow in request2size() (8642b217) · Commits · U-Boot / U-Boot · GitLab
Jump to