Security Bulletin: NVIDIA Jetson TX1, Jetson TK1, and Tegra K1 L4T Security Updates for CPU Speculative Side Channel Vulnerabilities

Answer ID 4616
Updated 03/20/2018 02:03 PM

Jetson and Tegra L4T response to CPU speculative side channel vulnerabilities - CVE-2017-5753, CVE-2017-5715, CVE-2017-5754


Bulletin Summary

NVIDIA is providing an initial security update to mitigate aspects of Google Project Zero's January 3, 2018, publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.

NVIDIA believes Jetson TX1, Jetson TK1, and Tegra K1 GPU hardware is immune to the reported security issue. Jetson TX1, Jetson TK1, and Tegra K1 integrate Arm-based (CPU) processors that may, in certain circumstances, benefit from software mitigations to reduce the risk of the exploits identified in the Google Project Zero disclosure. For more information, refer to the Arm Security Update.

This bulletin addresses NVIDIA software updates for Jetson TX1, Jetson TK1, and Tegra K1 to mitigate aspects of the potential CPU vulnerabilities.

These potential vulnerabilities have three known variants:

  • Variant 1 (CVE-2017-5753): Software mitigations for the Arm CPU issue are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners as future updates are released to further strengthen mitigations for the potentially affected CPU.
  • Variant 2 (CVE-2017-5715): Software mitigations for the Arm CPU issue are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners as future updates are released to further strengthen mitigations for the potentially affected CPU.
  • Variant 3 (CVE-2017-5754): NVIDIA believes that Jetson TX1, Jetson TK1, and Tegra K1 are not vulnerable to this variant.
  • Variant 3a (CVE-2017-5754): Based on Arm's Security Update, NVIDIA has no reason to believe that Jetson TX1, Jetson TK1, and Tegra K1 need software mitigations for this variant.

For updates and additional information, actively monitor the NVIDIA Product Security page.

Vulnerability Details

The following sections summarize the potential vulnerabilities. Descriptions are as published on MITRE and risk assessments follow CVSS.

CVE-2017-5753

Computer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.

CVSS Base Score: 8.2
CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

CVE-2017-5715

Computer systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.

CVSS Base Score: 8.2
CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

CVE-2017-5754

Computer systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis of the data cache.

CVSS Base Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

NVIDIA's risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn't know of any exploits to these issues at this time.

Updated Products

Product Integrated CPU OS
Jetson TX1 Software Arm Cortex-A57 processor Linux for Tegra
Jetson TK1 and Tegra K1 Software Arm Cortex-A15 processor Linux for Tegra

Security Updates

When available, download updates from NVIDIA DevZone.

Product Series OS Updated Version
Jetson TX1 Linux for Tegra BSP 28.2
BSP 24.2.3
Expected before the end of March 2018
Jetson TK1 and Tegra K1 Linux for Tegra BSP 21.7
Expected mid-April 2018

Acknowledgements

None.

Get the Most Up to Date Product Security Information

To learn more about the vulnerability management process followed by the NVIDIA Product Security Incident Response Team (PSIRT), see the current list of NVIDIA security bulletins, or subscribe to security bulletin notifications, go to NVIDIA Product Security.

Revision History

Revision Date Description
6.0 March 20, 2018 Revised the availability date of Jetson TK1 and Tegra K1 BSP 21.7
5.0 March 13, 2018 Revised the availability date of Jetson TX1 BSP 28.2
4.0 March 1, 2018 Revised the expected availability of the updated versions
3.0 February 6, 2018 Revised the expected availability of the TX1 version BSP 28.2
2.1 January 16, 2018 Updated the title
2.0 January 16, 2018 Clarified affected Arm CPU components
1.0 January 5, 2018 Initial release
Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Was this answer helpful?
Your rating has been submitted, please tell us how we can make this answer more useful.

LIVE CHAT

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

CONTACT US