{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Jetson TK1 (R21) pour L4T/Linux","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Jetson TX1 (R24) pour L4T/Linux","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Jetson TK1 and Jetson TX1 (R21 et R24) pour L4T/Linux","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-6273","url":"https://www.cve.org/CVERecord?id=CVE-2017-6273"},{"name":"CVE-2016-8400","url":"https://www.cve.org/CVERecord?id=CVE-2016-8400"},{"name":"CVE-2016-8428","url":"https://www.cve.org/CVERecord?id=CVE-2016-8428"},{"name":"CVE-2016-6916","url":"https://www.cve.org/CVERecord?id=CVE-2016-6916"},{"name":"CVE-2017-0331","url":"https://www.cve.org/CVERecord?id=CVE-2017-0331"},{"name":"CVE-2017-0332","url":"https://www.cve.org/CVERecord?id=CVE-2017-0332"},{"name":"CVE-2016-2491","url":"https://www.cve.org/CVERecord?id=CVE-2016-2491"},{"name":"CVE-2017-14491","url":"https://www.cve.org/CVERecord?id=CVE-2017-14491"},{"name":"CVE-2016-8449","url":"https://www.cve.org/CVERecord?id=CVE-2016-8449"},{"name":"CVE-2017-0306","url":"https://www.cve.org/CVERecord?id=CVE-2017-0306"},{"name":"CVE-2016-6917","url":"https://www.cve.org/CVERecord?id=CVE-2016-6917"},{"name":"CVE-2016-6775","url":"https://www.cve.org/CVERecord?id=CVE-2016-6775"},{"name":"CVE-2016-3847","url":"https://www.cve.org/CVERecord?id=CVE-2016-3847"},{"name":"CVE-2017-14494","url":"https://www.cve.org/CVERecord?id=CVE-2017-14494"},{"name":"CVE-2017-1000251","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000251"},{"name":"CVE-2017-0327","url":"https://www.cve.org/CVERecord?id=CVE-2017-0327"},{"name":"CVE-2016-8425","url":"https://www.cve.org/CVERecord?id=CVE-2016-8425"},{"name":"CVE-2017-0429","url":"https://www.cve.org/CVERecord?id=CVE-2017-0429"},{"name":"CVE-2016-6915","url":"https://www.cve.org/CVERecord?id=CVE-2016-6915"},{"name":"CVE-2016-3873","url":"https://www.cve.org/CVERecord?id=CVE-2016-3873"},{"name":"CVE-2017-14496","url":"https://www.cve.org/CVERecord?id=CVE-2017-14496"},{"name":"CVE-2017-14493","url":"https://www.cve.org/CVERecord?id=CVE-2017-14493"},{"name":"CVE-2016-8424","url":"https://www.cve.org/CVERecord?id=CVE-2016-8424"},{"name":"CVE-2017-0325","url":"https://www.cve.org/CVERecord?id=CVE-2017-0325"},{"name":"CVE-2017-0428","url":"https://www.cve.org/CVERecord?id=CVE-2017-0428"},{"name":"CVE-2016-6776","url":"https://www.cve.org/CVERecord?id=CVE-2016-6776"},{"name":"CVE-2016-6777","url":"https://www.cve.org/CVERecord?id=CVE-2016-6777"},{"name":"CVE-2016-8426","url":"https://www.cve.org/CVERecord?id=CVE-2016-8426"},{"name":"CVE-2016-0834","url":"https://www.cve.org/CVERecord?id=CVE-2016-0834"},{"name":"CVE-2016-8395","url":"https://www.cve.org/CVERecord?id=CVE-2016-8395"},{"name":"CVE-2017-0326","url":"https://www.cve.org/CVERecord?id=CVE-2017-0326"},{"name":"CVE-2016-3793","url":"https://www.cve.org/CVERecord?id=CVE-2016-3793"},{"name":"CVE-2016-8397","url":"https://www.cve.org/CVERecord?id=CVE-2016-8397"},{"name":"CVE-2016-3814","url":"https://www.cve.org/CVERecord?id=CVE-2016-3814"},{"name":"CVE-2016-8430","url":"https://www.cve.org/CVERecord?id=CVE-2016-8430"},{"name":"CVE-2016-2434","url":"https://www.cve.org/CVERecord?id=CVE-2016-2434"},{"name":"CVE-2017-0307","url":"https://www.cve.org/CVERecord?id=CVE-2017-0307"},{"name":"CVE-2017-1000250","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000250"},{"name":"CVE-2016-8482","url":"https://www.cve.org/CVERecord?id=CVE-2016-8482"},{"name":"CVE-2016-3930","url":"https://www.cve.org/CVERecord?id=CVE-2016-3930"},{"name":"CVE-2017-14492","url":"https://www.cve.org/CVERecord?id=CVE-2017-14492"},{"name":"CVE-2016-8427","url":"https://www.cve.org/CVERecord?id=CVE-2016-8427"},{"name":"CVE-2017-14495","url":"https://www.cve.org/CVERecord?id=CVE-2017-14495"},{"name":"CVE-2016-3815","url":"https://www.cve.org/CVERecord?id=CVE-2016-3815"},{"name":"CVE-2016-6789","url":"https://www.cve.org/CVERecord?id=CVE-2016-6789"},{"name":"CVE-2016-8429","url":"https://www.cve.org/CVERecord?id=CVE-2016-8429"}],"links":[],"reference":"CERTFR-2017-AVI-362","revisions":[{"description":"Version initiale","revision_date":"2017-10-18T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans NVIDIA Tegra Jetson\nL4T. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans NVIDIA Tegra Jetson L4T","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 NVIDIA du 17 octobre 2017","url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4561"}]}
