Trusty contains a vulnerability in command handlers where the length of input buffers is not verified. This vulnerability can cause memory corruption, which may lead to information disclosure, escalation of privileges, and denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.7 |
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory |
06 Jul 2021, 15:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 | |
References | (CONFIRM) https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory | |
CPE | cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:* cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.7 |
30 Jun 2021, 11:55
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-30 11:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34374
Mitre link : CVE-2021-34374
CVE.ORG link : CVE-2021-34374
JSON object : View
Products Affected
nvidia
- jetson_linux
- jetson_tx2_nx
- jetson_agx_xavier_32gb
- jetson_tx2
- jetson_agx_xavier_16gb
- jetson_tx2_4gb
- jetson_tx2i
- jetson_agx_xavier_8gb
- jetson_xavier_nx
CWE
CWE-20
Improper Input Validation