[Git][security-tracker-team/security-tracker][master] CVE-2024-5725*/u-boot are already fixed in trixie

Adrian Bunk (@bunk) bunk at debian.org
Tue Mar 25 12:10:19 GMT 2025



Adrian Bunk pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ab36aa81 by Adrian Bunk at 2025-03-25T14:09:56+02:00
CVE-2024-5725*/u-boot are already fixed in trixie

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -12464,34 +12464,34 @@ CVE-2024-11376 (The s2Member \u2013 Excellent for All Kinds of Memberships, Cont
 CVE-2021-46686 (Improper neutralization of special elements used in an OS command ('OS ...)
 	NOT-FOR-US: acmailer CGI
 CVE-2024-57259 (sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-on ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/048d795bb5b3d9c5701b4855f5e74bcf6849bf5e (v2025.01-rc1)
 CVE-2024-57258 (Integer overflows in memory allocation in Das U-Boot before 2025.01-rc ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/0a10b49206a29b4aa2f80233a3e53ca0466bb0b3 (v2025.01-rc1)
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/8642b2178d2c4002c99a0b69a845a48f2ae2706f (v2025.01-rc1)
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/c17b2a05dd50a3ba437e6373093a0d6a359cdee0 (v2025.01-rc1)
 CVE-2024-57257 (A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/4f5cc096bfd0a591f8a11e86999e3d90a9484c34 (v2025.01-rc1)
 CVE-2024-57256 (An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.0 ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/35f75d2a46e5859138c83a75cd2f4141c5479ab9 (v2025.01-rc1)
 CVE-2024-57255 (An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025. ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/233945eba63e24061dffeeaeb7cd6fe985278356 (v2025.01-rc1)
 CVE-2024-57254 (An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc ...)
-	- u-boot <unfixed> (bug #1098254)
+	- u-boot 2025.01-1 (bug #1098254)
 	[bookworm] - u-boot <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/02/17/2
 	NOTE: Fixed by: https://source.denx.de/u-boot/u-boot/-/commit/c8e929e5758999933f9e905049ef2bf3fe6b140d (v2025.01-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab36aa815f481bcfd841cb621622b354142c93ee

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab36aa815f481bcfd841cb621622b354142c93ee
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250325/079c7841/attachment.htm>


More information about the debian-security-tracker-commits mailing list