CVE-2024-57258
Published: 18 February 2025
Summary
CVE-2024-57258 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Denx U-Boot. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Bootkit (T1542.003); ranked at the 16.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely application of U-Boot patches from specified commits directly remediates the integer overflow in memory allocation during SquashFS processing.
Memory protection mechanisms such as non-executable regions or address randomization mitigate exploitation of the integer overflow in sbrk, request2size, and ptrdiff_t handling.
Validation of SquashFS filesystem inputs prior to processing in U-Boot prevents crafted filesystems from triggering the integer overflows.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer overflow in U-Boot bootloader enables memory corruption during SquashFS processing; with physical access this directly facilitates bootkit-style compromise before OS initialization (T1542.003).
NVD Description
Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64.
Deeper analysisAI
CVE-2024-57258 is an integer overflow vulnerability (CWE-190) affecting memory allocation in Das U-Boot versions before 2025.01-rc1. The flaw occurs when processing a crafted SquashFS filesystem, triggering overflows via the sbrk function, the request2size function, or mishandling of ptrdiff_t on x86_64 architectures.
Exploitation requires physical access to the target device (AV:P) and high attack complexity (AC:H), with no privileges (PR:N) or user interaction (UI:N) required. A successful attack can achieve high impacts on confidentiality, integrity, and availability (C:I:A:H/H/H) with a changed scope (S:C), resulting in a CVSS v3.1 base score of 7.1.
Mitigation patches are provided in U-Boot repository commits 0a10b49206a29b4aa2f80233a3e53ca0466bb0b3, 8642b2178d2c4002c99a0b69a845a48f2ae2706f, and c17b2a05dd50a3ba437e6373093a0d6a359cdee0. Advisories on oss-security (2025/02/17) and Debian LTS announce (2025/05/msg00001.html) detail the issue and recommend upgrading to U-Boot 2025.01-rc1 or applying the fixes.
Details
- CWE(s)