gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | u-boot | < 2019.01+dfsg-6 | u-boot_2019.01+dfsg-6_all.deb |
Debian | 11 | all | u-boot | < 2019.01+dfsg-6 | u-boot_2019.01+dfsg-6_all.deb |
Debian | 10 | all | u-boot | < 2019.01+dfsg-6 | u-boot_2019.01+dfsg-6_all.deb |
Debian | 999 | all | u-boot | < 2019.01+dfsg-6 | u-boot_2019.01+dfsg-6_all.deb |
Debian | 13 | all | u-boot | < 2019.01+dfsg-6 | u-boot_2019.01+dfsg-6_all.deb |