Name | CVE-2024-42040 |
Description | Buffer Overflow vulnerability in the net/bootp.c in DENEX U-Boot from its initial commit in 2002 (3861aa5) up to today on any platform allows an attacker on the local network to leak memory from four up to 32 bytes of memory stored behind the packet to the network depending on the later use of DHCP-provided parameters via crafted DHCP responses. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1081557 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
u-boot (PTS) | bullseye | 2021.01+dfsg-5 | vulnerable |
| bookworm | 2023.01+dfsg-2+deb12u1 | vulnerable |
| sid, trixie | 2024.01+dfsg-5 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
u-boot | source | (unstable) | (unfixed) | | | 1081557 |
Notes
[bookworm] - u-boot <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - u-boot <postponed> (Minor issue; can be fixed in next update)
https://lists.denx.de/pipermail/u-boot/2024-August/562528.html
https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2024-004.txt