gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
U-boot | Denx | 2014.04 (including) | 2019.04 (including) |
U-boot | Ubuntu | cosmic | * |
U-boot | Ubuntu | disco | * |
U-boot | Ubuntu | esm-infra/xenial | * |
U-boot | Ubuntu | upstream | * |
U-boot | Ubuntu | xenial | * |