Vulnerability Details
The following sections summarize the vulnerabilities. Descriptions use CWE™ and risk assessments follow CVSS.
CVE-2017-6248 and CVE-2017-6249
NVIDIA Tegra kernel audio driver contains a vulnerability in Audio DSP where an invalid user parameter may be copied without a check on the size of input, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 9.2 CVSS Temporal Score: 8.3 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H/E:P/RL:O/RC:C
CVE-2017-0744
NVIDIA Tegra kernel driver contains a vulnerability in the NVIDIA AVP driver where an input buffer is copied to an output buffer without a check on the size of the input buffer, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 8.2 CVSS Temporal Score: 7.4 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
CVE-2017-0331
NVIDIA Tegra kernel driver contains a vulnerability in NVMAP where untrusted data can change between validation and use, which may lead to a denial of service or possible escalation of privileges.
CVSS Base Score: 7.8 CVSS Temporal Score: 7.0 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVE-2017-6258
NVIDIA OpenMax Component contains a vulnerability in LIBNVOMX where there is the potential for secure decode to read or write a buffer using an index or pointer that references a memory location after the end of the buffer, which may lead to a denial of service or possible escalation of privileges.
CVSS Base Score: 7.1 CVSS Temporal Score: 6.4 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N/E:P/RL:O/RC:C
CVE-2017-6247
NVIDIA Tegra kernel audio driver contains a vulnerability in Audio DSP where an invalid user parameter may be copied without a check on the size of input, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 5.2 CVSS Temporal Score: 4.7 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVE-2017-0340
NVIDIA OpenMax Component contains a vulnerability in LIBNVOMX where user provided input can trigger access to a pointer that has not been initialized, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 5.2 CVSS Temporal Score: 4.7 CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C
CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785
Multiple vulnerabilities that have been referred to as “BlueBorne” were disclosed in the September 2017 Android Security Bulletin. Shield Tablet has addressed the applicable CVEs. For more information about these issues visit the Android website.
CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088
Multiple vulnerabilities that have been referred to as “KRACK” attacks were disclosed in the Android Security Advisory 2017-05. Shield Tablet has addressed the applicable CVEs. For more information about these issues visit the Android website.
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.
Affected Products
Product | OS |
---|---|
Shield Tablet | Android |
Fixes
Fixes for Shield are available from Settings>About>System update.
OS | Fixed Version |
---|---|
Android | SE 5.3 |
Note: Customers using earlier driver branches of these products should upgrade to one of the fixed supported driver branches listed.
Mitigations
None.
Acknowledgements
None.
Revision History
Revision | Date | Description |
---|---|---|
1.0 | November 30, 2017 | Initial release |
Disclaimer
ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.