Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5205 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2024-08-04T00:12:50.176Z
Reserved: 2021-06-09T00:00:00
Link: CVE-2021-34394

No data.

Status : Modified
Published: 2021-06-22T22:15:09.277
Modified: 2024-11-21T06:10:18.440
Link: CVE-2021-34394

No data.