First published: Wed Jun 30 2021(Updated: )
Trusty contains a vulnerability in all trusted applications (TAs) where the stack cookie was not randomized, which might result in stack-based buffer overflow, leading to denial of service, escalation of privileges, and information disclosure.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Linux for Tegra | <32.5.1 | |
NVIDIA Jetson AGX Xavier | ||
NVIDIA Jetson AGX Xavier | ||
NVIDIA Jetson AGX Xavier | ||
NVIDIA Jetson TX2 4GB | ||
NVIDIA Jetson TX2 4GB | ||
NVIDIA Jetson TX2 NX | ||
NVIDIA Jetson TX2i | ||
NVIDIA Jetson AGX Xavier |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Trusty vulnerability is CVE-2021-34375.
The severity level of CVE-2021-34375 is high.
NVIDIA Jetson Linux up to version 32.5.1 is affected by CVE-2021-34375.
CVE-2021-34375 can result in stack-based buffer overflow, leading to denial of service, escalation of privileges, and information disclosure.
More information about CVE-2021-34375 can be found at this reference: [https://nvidia.custhelp.com/app/answers/detail/a_id/5205](https://nvidia.custhelp.com/app/answers/detail/a_id/5205)