Today > | 3 Medium | 2 Low vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-0133

Oct. 2, 2024, 2:43 p.m.

CVSS Score

3.4 / 10

Products Impacted

Vendor Product Versions
nvidia
  • nvidia_container_toolkit
  • nvidia_gpu_operator
  • *
  • *
linux
  • linux_kernel
  • -

Description

NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

Weaknesses

CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.

CWE ID: 367

Date

Published: Sept. 26, 2024, 6:15 a.m.

Last Modified: Oct. 2, 2024, 2:43 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@nvidia.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a nvidia nvidia_container_toolkit / / / / / / / /
o linux linux_kernel - / / / / / / /
a nvidia nvidia_gpu_operator / / / / / / / /
o linux linux_kernel - / / / / / / /

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

Base Score
3.4
Exploitability Score
1.6
Impact Score
1.4
Base Severity
LOW
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N

References