NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5582 | Vendor Advisory |
Configurations
History
02 Oct 2024, 14:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:nvidia:nvidia_gpu_operator:*:*:*:*:*:*:*:* cpe:2.3:a:nvidia:nvidia_container_toolkit:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.4 |
First Time |
Linux linux Kernel
Nvidia nvidia Container Toolkit Nvidia nvidia Gpu Operator Nvidia Linux |
|
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5582 - Vendor Advisory |
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 06:15
Updated : 2024-10-02 14:43
NVD link : CVE-2024-0133
Mitre link : CVE-2024-0133
CVE.ORG link : CVE-2024-0133
JSON object : View
Products Affected
linux
- linux_kernel
nvidia
- nvidia_gpu_operator
- nvidia_container_toolkit
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition