Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-11690

Опубликовано: 03 мая 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.

РелизСтатусПримечание
bionic

not-affected

2019.07+dfsg-1ubuntu4~18.04.1
cosmic

ignored

end of life
devel

not-affected

2020.04+dfsg-2ubuntu1
disco

ignored

end of life
eoan

not-affected

2019.01+dfsg-6
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2019.07+dfsg-1ubuntu4~18.04.1
esm-infra/focal

not-affected

2019.07+dfsg-1ubuntu6
esm-infra/xenial

needed

focal

not-affected

2019.07+dfsg-1ubuntu6

Показывать по

EPSS

Процентиль: 54%
0.00316
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
почти 7 лет назад

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.

CVSS3: 5.9
debian
почти 7 лет назад

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 la ...

CVSS3: 5.9
github
больше 3 лет назад

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.

suse-cvrf
около 5 лет назад

Security update for u-boot

suse-cvrf
около 5 лет назад

Security update for u-boot

EPSS

Процентиль: 54%
0.00316
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3