Vulnerability Description
Trusty contains a vulnerability in command handlers where the length of input buffers is not verified. This vulnerability can cause memory corruption, which may lead to information disclosure, escalation of privileges, and denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nvidia | Jetson Linux | < 32.5.1 |
| Nvidia | Jetson Agx Xavier 16Gb | - |
| Nvidia | Jetson Agx Xavier 32Gb | - |
| Nvidia | Jetson Agx Xavier 8Gb | - |
| Nvidia | Jetson Tx2 | - |
| Nvidia | Jetson Tx2 4Gb | - |
| Nvidia | Jetson Tx2 Nx | - |
| Nvidia | Jetson Tx2I | - |
| Nvidia | Jetson Xavier Nx | - |
Related Weaknesses (CWE)
References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5205Vendor Advisory
- https://nvidia.custhelp.com/app/answers/detail/a_id/5205Vendor Advisory
FAQ
What is CVE-2021-34374?
CVE-2021-34374 is a vulnerability with a CVSS score of 7.7 (HIGH). Trusty contains a vulnerability in command handlers where the length of input buffers is not verified. This vulnerability can cause memory corruption, which may lead to information disclosure, escalat...
How severe is CVE-2021-34374?
CVE-2021-34374 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-34374?
Check the references section above for vendor advisories and patch information. Affected products include: Nvidia Jetson Linux, Nvidia Jetson Agx Xavier 16Gb, Nvidia Jetson Agx Xavier 32Gb, Nvidia Jetson Agx Xavier 8Gb, Nvidia Jetson Tx2.