43 results (0.006 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. A successful exploit of this vulnerability may lead to denial of service, code execution, and escalation of privileges. • https://nvidia.custhelp.com/app/answers/detail/a_id/5555 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

NVIDIA Jetson Linux Driver Package contains a vulnerability in nvbootctrl, where a privileged local attacker can configure invalid settings, resulting in denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5466 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0

NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity. • https://https://nvidia.custhelp.com/app/answers/detail/a_id/5466 • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •

CVSS: 7.9EPSS: 0%CPEs: 14EXPL: 0

NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components. NVIDIA Trusted OS contiene una vulnerabilidad en un controlador de llamadas SMC, donde no validar entradas que no son de confianza puede permitir que un atacante local con privilegios elevados provoque la divulgación de información y comprometa la integridad. El alcance del impacto puede extenderse a otros componentes. • https://nvidia.custhelp.com/app/answers/detail/a_id/5417 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service. Las distribuciones NVIDIA de Linux contienen una vulnerabilidad en nvdla_emu_task_submit, donde una entrada no validada puede permitir que un atacante local provoque un desbordamiento del búfer basado en pila en el código del kernel, lo que puede conducir a una escalada de privilegios, comprometer la integridad y la confidencialidad y Denegación de Servicio (DoS). • https://nvidia.custhelp.com/app/answers/detail/a_id/5417 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •