CVE-2021-34382

Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*
cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:10

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 6.7
References () https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory () https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory

07 Nov 2023, 03:35

Type Values Removed Values Added
Summary Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel. Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel.

Information

Published : 2021-06-30 11:15

Updated : 2024-11-21 06:10


NVD link : CVE-2021-34382

Mitre link : CVE-2021-34382

CVE.ORG link : CVE-2021-34382


JSON object : View

Products Affected

nvidia

  • jetson_linux
  • jetson_tx1
CWE
CWE-190

Integer Overflow or Wraparound