CVE-2019-11690Use of Insufficiently Random Values in U-boot

Severity
5.9MEDIUMNVD
EPSS
0.3%
top 45.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 3
Latest updateMay 24

Description

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/u-boot< u-boot 2019.01+dfsg-6 (bookworm)
Debiandenx/u-boot< 2019.01+dfsg-6+3
NVDdenx/u-boot2014.042019.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6xpg-gw5j-9x8w: gen_rand_uuid in lib/uuid2022-05-24
OSV
CVE-2019-11690: gen_rand_uuid in lib/uuid2019-05-03

📋Vendor Advisories

1
Debian
CVE-2019-11690: u-boot - gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an sra...2019
CVE-2019-11690 — Use of Insufficiently Random Values | cvebase