Vulnerability Details
The following section summarizes the potential vulnerability. The description uses CWE™ and the risk assessment follows CVSS.
CVE-2017-6276
NVIDIA Tegra OpenMax Component contains a vulnerability in LIBNVMMLITE_VIDEO.SO, where the media server may be referencing memory after it has been freed, which may lead to denial of service or possible escalation of privileges.
CVSS Base Score: 7.8 CVSS Temporal Score: 7.0 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.
Affected Software Version
The following software version and driver branch is impacted by the issue described in this bulletin.
CVE | Product | OS | Version |
---|---|---|---|
CVE-2017-6276 | SHIELD Tablet Software | Android | SHIELD Experience 5.3 and prior |
Notes:
-
For available security updates, see Software Security Updates.
-
For the latest software version and driver branch updates go to NVIDIA Product Security to subscribe to security bulletin notifications.
-
Support may have expired for certain software versions or driver branches. Contact NVIDIA Support with any questions.
Software Security Updates
The following supported software version contains the security update for the issue described in this bulletin. If you are using an unsupported software version or an earlier driver branch that is no longer supported, upgrade to the updated supported version listed.
Product | OS | Updated Version |
---|---|---|
SHIELD Tablet | Android | SHIELD Experience 5.4 |
Notes:
-
Updates for SHIELD are available from Settings>About >System update.
-
SHIELD Tablet 5.4 also contains updates for CPU speculative side-channel vulnerabilities. For more information, see Security Bulletin ID: 4614.
Acknowledgements
None.
Get the Most Up to Date Product Security Information
To learn more about the vulnerability management process followed by the NVIDIA Product Security Incident Response Team (PSIRT), see the current list of NVIDIA security bulletins, or subscribe to security bulletin notifications, go to NVIDIA Product Security.
Revision History
Revision | Date | Description |
---|---|---|
1.0 | March 22, 2018 | Initial release |
Disclaimer
ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.