Vulnerabilities > Nvidia > Jetson Linux > High

DATE CVE VULNERABILITY TITLE RISK
2024-08-08 CVE-2024-0108 Improper Handling of Exceptional Conditions vulnerability in Nvidia Jetson Linux
NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt.
local
low complexity
nvidia CWE-755
8.8
2022-12-30 CVE-2022-42269 Improper Input Validation vulnerability in Nvidia Jetson Linux
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity.
local
low complexity
nvidia CWE-20
7.9
2022-12-30 CVE-2022-42270 Out-of-bounds Write vulnerability in Nvidia Jetson Linux
NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service.
local
low complexity
nvidia CWE-787
7.8
2022-03-11 CVE-2022-21819 Incorrect Permission Assignment for Critical Resource vulnerability in Nvidia Jetson Linux
NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus.
low complexity
nvidia CWE-732
7.6
2021-06-30 CVE-2021-34382 Integer Overflow or Wraparound vulnerability in Nvidia Jetson Linux
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel.
local
low complexity
nvidia CWE-190
7.8
2021-06-21 CVE-2021-34387 Incorrect Default Permissions vulnerability in Nvidia Jetson Linux
The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.
local
low complexity
nvidia CWE-276
7.2