Vulnerabilities > Nvidia > Jetson TX2 > r28.1

DATE CVE VULNERABILITY TITLE RISK
2019-04-12 CVE-2018-6269 Incorrect Permission Assignment for Critical Resource vulnerability in Nvidia Jetson TX2 R28.1/R28.2.1
NVIDIA Jetson TX2 contains a vulnerability in the kernel driver where input/output control (IOCTL) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution.
local
low complexity
nvidia CWE-732
4.6
2019-04-12 CVE-2018-6239 Information Exposure vulnerability in Nvidia Jetson TX2 R28.1/R28.2.1
NVIDIA Jetson TX2 contains a vulnerability by means of speculative execution where local and unprivileged code may access the contents of cached information in an unauthorized manner, which may lead to information disclosure.
local
low complexity
nvidia CWE-200
2.1
2019-04-11 CVE-2019-5673 Improper Check for Unusual or Exceptional Conditions vulnerability in Nvidia Jetson TX2 R28.1/R28.2.1
NVIDIA Jetson TX2 contains a vulnerability in the kernel driver (on all versions prior to R28.3) where the ARM System Memory Management Unit (SMMU) improperly checks for a fault condition, causing transactions to be discarded, which may lead to denial of service.
local
low complexity
nvidia CWE-754
3.6
2019-04-11 CVE-2019-5672 Key Management Errors vulnerability in Nvidia Jetson TX1 and Jetson TX2
NVIDIA Jetson TX1 and TX2 contain a vulnerability in the Linux for Tegra (L4T) operating system (on all versions prior to R28.3) where the Secure Shell (SSH) keys provided in the sample rootfs are not replaced by unique host keys after sample rootsfs generation and flashing, which may lead to information disclosure.
network
low complexity
nvidia CWE-320
6.4
2018-05-22 CVE-2018-3639 Information Exposure Through Discrepancy vulnerability in multiple products
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
2.1