Vulnerabilities > Nvidia > Jetson Linux > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-08-08 | CVE-2024-0108 | Improper Handling of Exceptional Conditions vulnerability in Nvidia Jetson Linux NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. | 8.8 |
2022-12-30 | CVE-2022-42269 | Improper Input Validation vulnerability in Nvidia Jetson Linux NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. | 7.9 |
2022-12-30 | CVE-2022-42270 | Out-of-bounds Write vulnerability in Nvidia Jetson Linux NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service. | 7.8 |
2022-03-11 | CVE-2022-21819 | Incorrect Permission Assignment for Critical Resource vulnerability in Nvidia Jetson Linux NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. | 7.6 |
2021-06-30 | CVE-2021-34382 | Integer Overflow or Wraparound vulnerability in Nvidia Jetson Linux Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel. | 7.8 |
2021-06-21 | CVE-2021-34387 | Incorrect Default Permissions vulnerability in Nvidia Jetson Linux The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only. | 7.2 |