45 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

NVIDIA Jetson Linux Driver Package contains a vulnerability in nvbootctrl, where a privileged local attacker can configure invalid settings, resulting in denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5466 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0

NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity. • https://https://nvidia.custhelp.com/app/answers/detail/a_id/5466 • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •

CVSS: 7.9EPSS: 0%CPEs: 14EXPL: 0

NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components. NVIDIA Trusted OS contiene una vulnerabilidad en un controlador de llamadas SMC, donde no validar entradas que no son de confianza puede permitir que un atacante local con privilegios elevados provoque la divulgación de información y comprometa la integridad. El alcance del impacto puede extenderse a otros componentes. • https://nvidia.custhelp.com/app/answers/detail/a_id/5417 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service. Las distribuciones NVIDIA de Linux contienen una vulnerabilidad en nvdla_emu_task_submit, donde una entrada no validada puede permitir que un atacante local provoque un desbordamiento del búfer basado en pila en el código del kernel, lo que puede conducir a una escalada de privilegios, comprometer la integridad y la confidencialidad y Denegación de Servicio (DoS). • https://nvidia.custhelp.com/app/answers/detail/a_id/5417 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot ext4_mount function, where Insufficient validation of untrusted data may allow a highly privileged local attacker to cause an integer overflow. This difficult-to-exploit vulnerability may lead to code execution, escalation of privileges, limited denial of service, and some impact to confidentiality and integrity. The scope of impact can extend to other components. El paquete de controladores de NVIDIA Jetson para Linux contiene una vulnerabilidad en la función Cboot ext4_mount, en la que una validación insuficiente de los datos no fiables puede permitir a un atacante local con muchos privilegios provocar un desbordamiento de enteros. Esta vulnerabilidad difícil de explotar puede llevar a la ejecución de código, escalada de privilegios, denegación de servicio limitada y algún impacto en la confidencialidad e integridad. • https://nvidia.custhelp.com/app/answers/detail/a_id/5343 • CWE-190: Integer Overflow or Wraparound •