Security Bulletin: NVIDIA Shield Tablet contains multiple vulnerabilities; updates for “BlueBorne” and “KRACK”.

Answer ID 4569
Updated 11/30/2017 11:38 AM

NVIDIA Shield Tablet vulnerabilities may lead to denial of service or possible escalation of privileges.

Go to NVIDIA Product Security.


Vulnerability Details

The following sections summarize the vulnerabilities. Descriptions use CWE™ and risk assessments follow CVSS.

CVE-2017-6248 and CVE-2017-6249

NVIDIA Tegra kernel audio driver contains a vulnerability in Audio DSP where an invalid user parameter may be copied without a check on the size of input, which may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 9.2
CVSS Temporal Score: 8.3
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H/E:P/RL:O/RC:C

CVE-2017-0744

NVIDIA Tegra kernel driver contains a vulnerability in the NVIDIA AVP driver where an input buffer is copied to an output buffer without a check on  the size of the input buffer, which may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 8.2
CVSS Temporal Score: 7.4
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0331

NVIDIA Tegra kernel driver contains a vulnerability in NVMAP where untrusted data can change between validation and use, which may lead to a denial of service or possible escalation of privileges.

CVSS Base Score: 7.8
CVSS Temporal Score: 7.0
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-6258

NVIDIA OpenMax Component contains a vulnerability in LIBNVOMX where there is the potential for secure decode to read or write a buffer using an index or pointer that references a memory location after the end of the buffer, which may lead to a denial of service or possible escalation of privileges.

CVSS Base Score: 7.1
CVSS Temporal Score: 6.4
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N/E:P/RL:O/RC:C

CVE-2017-6247

NVIDIA Tegra kernel audio driver contains a vulnerability in Audio DSP where an invalid user parameter may be copied without a check on the size of input, which may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 5.2
CVSS Temporal Score: 4.7
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0340

NVIDIA OpenMax Component contains a vulnerability in LIBNVOMX where user provided input can trigger access to a pointer that has not been initialized, which may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 5.2
CVSS Temporal Score: 4.7
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C

CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785

Multiple vulnerabilities that have been referred to as “BlueBorne” were disclosed in the September 2017 Android Security Bulletin. Shield Tablet has addressed the applicable CVEs. For more information about these issues visit the Android website.

CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

Multiple vulnerabilities that have been referred to as “KRACK” attacks were disclosed in the Android Security Advisory 2017-05. Shield Tablet has addressed the applicable CVEs. For more information about these issues visit the Android website.

NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.

Affected Products

Product OS
Shield Tablet
Android

Fixes

Fixes for Shield are available from Settings>About>System update.

OS Fixed Version
Android SE 5.3

Note: Customers using earlier driver branches of these products should upgrade to one of the fixed supported driver branches listed.

Mitigations

None.

Acknowledgements

None.

Revision History

Revision Date Description
1.0 November 30, 2017 Initial release
Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Was this answer helpful?
Your rating has been submitted, please tell us how we can make this answer more useful.

LIVE CHAT

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

CONTACT US