First published: Thu Sep 26 2024(Updated: )
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/NVIDIA/nvidia-container-toolkit | <1.16.2 | 1.16.2 |
All of | ||
NVIDIA Container Toolkit | <1.16.2 | |
Linux kernel | ||
All of | ||
NVIDIA GPU Operator | <24.6.2 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0133 has a medium severity due to its ability to create empty files on the host file system from a specially crafted container.
To fix CVE-2024-0133, upgrade to NVIDIA Container Toolkit version 1.16.2 or later.
NVIDIA Container Toolkit versions 1.16.1 and earlier are affected by CVE-2024-0133.
CVE-2024-0133 does not impact use cases where Container Device Interface (CDI) is used.
Exploitation of CVE-2024-0133 may lead to unauthorized file creation on the host file system.