Trusty contains a vulnerability in all trusted applications (TAs) where the stack cookie was not randomized, which might result in stack-based buffer overflow, leading to denial of service, escalation of privileges, and information disclosure.
References
| Link | Resource |
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
| https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 06:10
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.7 |
| References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory |
06 Jul 2021, 15:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.7 |
| CWE | CWE-787 | |
| CPE | cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:* cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:* cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:* |
30 Jun 2021, 11:55
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-06-30 11:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34375
Mitre link : CVE-2021-34375
CVE.ORG link : CVE-2021-34375
JSON object : View
Products Affected
nvidia
- jetson_tx2i
- jetson_agx_xavier_8gb
- jetson_tx2_4gb
- jetson_tx2_nx
- jetson_tx2
- jetson_xavier_nx
- jetson_agx_xavier_32gb
- jetson_agx_xavier_16gb
- jetson_linux
CWE
CWE-787
Out-of-bounds Write
