Page 4 of 38 results (0.005 seconds)

CVSS: 5.6EPSS: 0%CPEs: 7EXPL: 0

26 Jan 2021 — NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to information disclosure. El kernel de NVIDIA Tegra en Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano y Nano 2GB, todas las versiones L4T anteriores a r32.5, contiene una vulnerabilidad en el controlad... • https://nvidia.custhelp.com/app/answers/detail/a_id/5147 •

CVSS: 6.1EPSS: 0%CPEs: 9EXPL: 0

20 Jan 2021 — NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the NVHost function, which may lead to abnormal reboot due to a null pointer reference, causing data loss. NVIDIA SHIELD TV, todas las versiones anteriores a 8.2.2, contiene una vulnerabilidad en la función NVHost, que puede conllevar a un reinicio anormal debido a una referencia de puntero nulo, causando la pérdida de datos • https://nvidia.custhelp.com/app/answers/detail/a_id/5147 • CWE-476: NULL Pointer Dereference •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

19 Jul 2019 — In NVIDIA Jetson TX1 L4T R32 version branch prior to R32.2, Tegra bootloader contains a vulnerability in nvtboot in which the nvtboot-cpu image is loaded without the load address first being validated, which may lead to code execution, denial of service, or escalation of privileges. En Jetson TX1 L4T rango de versión de R32 anterior a R32.2 de NVIDIA, el cargador de arranque Tegra contiene una vulnerabilidad en nvtboot en la que se carga la imagen nvtboot-cpu sin que la dirección de carga sea comprobada pri... • http://www.securityfocus.com/bid/109341 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

11 Apr 2019 — NVIDIA Jetson TX1 and TX2 contain a vulnerability in the Linux for Tegra (L4T) operating system (on all versions prior to R28.3) where the Secure Shell (SSH) keys provided in the sample rootfs are not replaced by unique host keys after sample rootsfs generation and flashing, which may lead to information disclosure. NVIDIA Jetson TX1 y TX2 contienen una vulnerabilidad en el sistema operativo Linux para Tegra (L4T) (en todas las versiones anteriores a R28.3) donde las claves de Secure Shell (SSH) proporciona... • https://nvidia.custhelp.com/app/answers/detail/a_id/4787 • CWE-320: Key Management Errors •

CVSS: 5.6EPSS: 46%CPEs: 665EXPL: 7

21 May 2018 — Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. Los sistemas con microprocesadores que emplean la ejecución especulativa y que realizan la ejecución especulativa de lecturas de memoria antes de que se conozcan las direcciones de todas l... • https://packetstorm.news/files/id/147839 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-203: Observable Discrepancy •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

26 Mar 2018 — NVIDIA Tegra kernel contains a vulnerability in the CORE DVFS Thermal driver where there is the potential to read or write a buffer using an index or pointer that references a memory location after the end of the buffer, which may lead to a denial of service or possible escalation of privileges. El kernel de NVIDIA Tegra contiene una vulnerabilidad en el controlador CORE DVFS Thermal, donde existe la posibilidad de que se produzca una lectura o escritura de búfer empleando un índice o un puntero que haga re... • http://nvidia.custhelp.com/app/answers/detail/a_id/4635 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 68%CPEs: 54EXPL: 4

02 Oct 2017 — Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. Un desbordamiento de búfer basado en memoria dinámica (heap) en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegación de servicio (cierre inesperado) o ejecutar código arbitrario utilizando una respuesta DNS manipulada. A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replie... • https://packetstorm.news/files/id/144480 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.0EPSS: 4%CPEs: 43EXPL: 7

12 Sep 2017 — The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. La pila Bluetooth nativa en el Kernel Linux (BlueZ), comenzando por la versión 2.6.32 del kernel de Linux y hasta, e incluyendo, la versión 4.13.1, es vulnerable a un desbordamiento de pila durante el procesado de las respuestas... • https://packetstorm.news/files/id/144307 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •