gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
References
Link | Resource |
---|---|
https://patchwork.ozlabs.org/patch/1092945 | Patch Third Party Advisory |
https://patchwork.ozlabs.org/patch/1092945 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchwork.ozlabs.org/patch/1092945 - Patch, Third Party Advisory |
Information
Published : 2019-05-03 13:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11690
Mitre link : CVE-2019-11690
CVE.ORG link : CVE-2019-11690
JSON object : View
Products Affected
denx
- u-boot
CWE
CWE-330
Use of Insufficiently Random Values