CVE-2019-11690

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
References
Link Resource
https://patchwork.ozlabs.org/patch/1092945 Patch Third Party Advisory
https://patchwork.ozlabs.org/patch/1092945 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () https://patchwork.ozlabs.org/patch/1092945 - Patch, Third Party Advisory () https://patchwork.ozlabs.org/patch/1092945 - Patch, Third Party Advisory

Information

Published : 2019-05-03 13:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11690

Mitre link : CVE-2019-11690

CVE.ORG link : CVE-2019-11690


JSON object : View

Products Affected

denx

  • u-boot
CWE
CWE-330

Use of Insufficiently Random Values