Known Vulnerabilities for Jetson Tx2i by Nvidia

Listed below are 10 of the newest known vulnerabilities associated with the software "Jetson Tx2i" by "Nvidia".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-34378 Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 11 is missing. Improper restriction o... 6.7 - MEDIUM 2021-06-30 2021-07-06
CVE-2021-34377 Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 9 is missing. Improper restriction of... 6.7 - MEDIUM 2021-06-30 2021-07-06
CVE-2021-34376 Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 5 is missing. Improper restriction of... 6.7 - MEDIUM 2021-06-30 2021-07-06
CVE-2021-34375 Trusty contains a vulnerability in all trusted applications (TAs) where the stack cookie was not randomized, which might resu... 6.7 - MEDIUM 2021-06-30 2021-07-06
CVE-2021-34374 Trusty contains a vulnerability in command handlers where the length of input buffers is not verified. This vulnerability can... 6.7 - MEDIUM 2021-06-30 2021-07-06
CVE-2021-34372 Trusty (the trusted OS produced by NVIDIA for Jetson devices) driver contains a vulnerability in the NVIDIA OTE protocol mess... 7.8 - HIGH 2021-06-22 2021-06-29
CVE-2021-23219 NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated pr... 4.4 - MEDIUM 2021-11-20 2021-11-24
CVE-2021-1125 NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated pr... 4.4 - MEDIUM 2021-11-20 2021-11-26
CVE-2021-1105 NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated pr... 4.4 - MEDIUM 2021-11-20 2021-11-24
CVE-2021-1088 NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated pr... 4.4 - MEDIUM 2021-11-20 2021-11-24

Popular searches for Jetson Tx2i

Extend AI Computing with the Jetson TX2i

developer.nvidia.com/embedded/jetson-tx2i

Extend AI Computing with the Jetson TX2i NVIDIA Jetson TX2i modules rugged design, small form factor, and reduced power envelope make it ideal for high-performance edge computing devices such as industrial robots, machine vision cameras, and portable medical equipment.

developer.nvidia.com/embedded/buy/jetson-tx2i Nvidia Jetson Computing Artificial intelligence Edge computing Machine vision Industrial robot Small form factor Modular programming Medical device Nvidia Computer Supercomputer Camera Design Programmer Software Rugged computer Envelope (waves) Software portability Multi-core processor

NVIDIA Jetson TX2i Module for Industrial Environments

forums.developer.nvidia.com/t/nvidia-jetson-tx2i-module-for-industrial-environments/58962

9 5NVIDIA Jetson TX2i Module for Industrial Environments NVIDIA is pleased to announce the Jetson X2i j h f module for industrial environments. The rugged design, small form factor and power envelope make the Jetson X2i Designed for reliable operation in harsh industrial environments, Jetson X2i | provides long operating life MTBF with support for ECC memory and comes with extended warranty and sales lifecycle. Je...

devtalk.nvidia.com/default/topic/1030837/jetson-tx2/nvidia-jetson-tx2i-module-for-industrial-environments Nvidia Jetson Modular programming Industrial Ethernet Nvidia ECC memory Mean time between failures Edge computing Extended warranty Machine vision Industrial robot Computer Small form factor Medical device Supercomputer LPDDR Transfer (computing) Rugged computer Camera Raw image format Data buffer

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report