First published: Tue Jun 22 2021(Updated: )
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Jetson Linux | <32.5.1 | |
NVIDIA Jetson TX1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NVIDIA TLK kernel vulnerability is CVE-2021-34392.
The title of this vulnerability is 'Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map...'.
The description of this vulnerability is 'Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.'
The NVIDIA Jetson Linux software version up to exclusive 32.5.1 is affected by this vulnerability.
The severity of this vulnerability is medium, with a severity value of 5.5.
This vulnerability can be exploited by bypassing boundary checks in the tz_map_shared_mem function of the NVIDIA TLK kernel, leading to potential denial of service.
To fix this vulnerability, update your NVIDIA Jetson Linux software to version 32.5.1 or higher.
No, the NVIDIA Jetson TX1 is not affected by this vulnerability.
Yes, you can find more information about this vulnerability at: https://nvidia.custhelp.com/app/answers/detail/a_id/5205
The Common Weakness Enumeration (CWE) ID for this vulnerability is 190.