First published: Tue Oct 15 2024(Updated: )
NVIDIA NeMo contains a vulnerability in SaveRestoreConnector where a user may cause a path traversal issue via an unsafe .tar file extraction. A successful exploit of this vulnerability may lead to code execution and data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
NVIDIA NeMo | <=r2.0.0rc0 | |
Any of | ||
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0129 is classified as a high severity vulnerability due to its potential for code execution and data tampering.
To fix CVE-2024-0129, update NVIDIA NeMo to a version beyond r2.0.0rc0 that addresses the path traversal issue.
CVE-2024-0129 is caused by an unsafe extraction of .tar files within the SaveRestoreConnector component of NVIDIA NeMo.
Users of NVIDIA NeMo versions up to and including r2.0.0rc0 are affected by CVE-2024-0129.
Exploiting CVE-2024-0129 could lead to unauthorized code execution and data tampering on affected systems.