The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5205 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5205 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.3 |
Information
Published : 2021-06-21 22:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34387
Mitre link : CVE-2021-34387
CVE.ORG link : CVE-2021-34387
JSON object : View
Products Affected
nvidia
- jetson_linux
- jetson_tx1
CWE
CWE-276
Incorrect Default Permissions