Input Buffer Validation Flaw in Trusty by NVIDIA
CVE-2021-34374
7.7HIGH
Key Information:
- Vendor
- Nvidia
- Vendor
- CVE Published:
- 30 June 2021
Summary
The Trusty environment from NVIDIA includes a vulnerability in its command handlers, where the system fails to adequately verify the lengths of input buffers. This flaw can lead to severe issues including memory corruption, which may subsequently allow unauthorized disclosure of sensitive information, potential escalation of user privileges, and even denial of service. Ensuring proper validation of input lengths is crucial to maintaining the integrity and security of the system.
Affected Version(s)
NVIDIA Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX All Jetson Linux versions prior to r32.5.1
References
CVSS V3.1
Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved