CVE-2024-0133
Severity
3.4LOW
EPSS
0.6%
top 29.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 26
Latest updateNov 4
Description
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:NExploitability: 2.3 | Impact: 1.4
Affected Packages5 packages
🔴Vulnerability Details
4OSV▶
NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system in github.com/NVIDIA/nvidia-container-toolkit↗2024-11-04
GHSA▶
NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system↗2024-10-29
OSV▶
NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system↗2024-10-29
📋Vendor Advisories
2Microsoft▶
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This do↗2024-09-10