NVIDIA Jetson TX2 R28.1

CPE Details

NVIDIA Jetson TX2 R28.1
r28.1
2020-01-08
17h09 +00:00
2020-01-08
17h09 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:nvidia:jetson_tx2:r28.1:*:*:*:*:*:*:*

Informations

Vendor

nvidia

Product

jetson_tx2

Version

r28.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-6269 2019-04-12 14h25 +00:00 NVIDIA Jetson TX2 contains a vulnerability in the kernel driver where input/output control (IOCTL) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. The updates apply to all versions prior to R28.3.
7.8
High
CVE-2018-6239 2019-04-12 14h24 +00:00 NVIDIA Jetson TX2 contains a vulnerability by means of speculative execution where local and unprivileged code may access the contents of cached information in an unauthorized manner, which may lead to information disclosure. The updates apply to all versions prior to R28.3.
5.5
Medium
CVE-2019-5673 2019-04-11 14h38 +00:00 NVIDIA Jetson TX2 contains a vulnerability in the kernel driver (on all versions prior to R28.3) where the ARM System Memory Management Unit (SMMU) improperly checks for a fault condition, causing transactions to be discarded, which may lead to denial of service.
6.1
Medium
CVE-2019-5672 2019-04-11 14h37 +00:00 NVIDIA Jetson TX1 and TX2 contain a vulnerability in the Linux for Tegra (L4T) operating system (on all versions prior to R28.3) where the Secure Shell (SSH) keys provided in the sample rootfs are not replaced by unique host keys after sample rootsfs generation and flashing, which may lead to information disclosure.
9.1
Critical
CVE-2018-3639 2018-05-22 12h00 +00:00 Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
5.5
Medium