7.8
CWE
732
Advisory Published
Updated

CVE-2018-6269

First published: Fri Apr 12 2019(Updated: )

NVIDIA Jetson TX2 contains a vulnerability in the kernel driver where input/output control (IOCTL) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. The updates apply to all versions prior to R28.3.

Credit: psirt@nvidia.com

Affected SoftwareAffected VersionHow to fix
NVIDIA Jetson TX2<r28.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2018-6269.

  • What is the severity of CVE-2018-6269?

    The severity of CVE-2018-6269 is high.

  • What is the affected software?

    The affected software is NVIDIA Jetson TX2 version up to exclusive r28.3.

  • How can CVE-2018-6269 be exploited?

    CVE-2018-6269 can be exploited by creating a non-trusted pointer dereference through IOCTL handling for user mode requests.

  • Is there a fix available for CVE-2018-6269?

    Yes, there are updates available for the vulnerability. Please refer to the NVIDIA support page for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203