Source: u-boot
Version: 2019.01+dfsg-5
Severity: normal
Tags: security upstream
Forwarded: https://patchwork.ozlabs.org/patch/1092945

Hi Vagrant,

The following vulnerability was published for u-boot. I'm not sure how
relevant the issue is in Debian context, and we marked the issue at
least laready no-dsa for stretch.

CVE-2019-11690[0]:
| gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04
| lacks an srand call, which allows attackers to determine UUID values
| in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is
| relied upon for UUID values of a GUID Partition Table of a boot
| device.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11690
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11690
[1] https://patchwork.ozlabs.org/patch/1092945

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to