Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-0133

Опубликовано: 26 сент. 2024
Источник: redhat
CVSS3: 3.4
EPSS Низкий

Описание

NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

A flaw was found in the in the default mode of operation in the NVIDIA Container Toolkit. This flaw allows a specially crafted container image to create empty files on the host file system. This issue does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

Отчет

Due to certain circumstances, this vulnerability in the NVIDIA Container Toolkit is not affecting Red Hat Products and is rated as Important severity rather than Critical. First, a specifically crafted container image is required for effective exploitation. Only Red Hat Signed containers are offered. Additionally, user interaction is required for exploitation, further reducing the likelihood of an attack. Most importantly, this vulnerability does not impact use cases that comply with our operating procedures by utilizing the Container Device Interface (CDI). As a result, this vulnerability does not affect Red Hat products because of the use of CDI. Furthermore, for an attacker to deploy a crafted container image, they would need an environment that permits untrusted containers, which is a scenario that is not typical for Red Hat customers.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-nvidia-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2314825nvidia-container-toolkit: Data tampering in NVIDIA Container Toolkit

EPSS

Процентиль: 70%
0.00634
Низкий

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 4.1
nvd
около 1 года назад

NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

CVSS3: 3.4
msrc
около 1 года назад

NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

CVSS3: 4.1
github
около 1 года назад

NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system

CVSS3: 4.1
fstec
почти 2 года назад

Уязвимость программного обеспечения для создания и запуска контейнеров NVIDIA Container Toolkit и программного средства для управления ресурсами NVIDIA GPU Operator, позволяющая нарушителю изменить произвольные данные

CVSS3: 5.5
redos
около 1 месяца назад

Множественные уязвимости nvidia-container-toolkit

EPSS

Процентиль: 70%
0.00634
Низкий

3.4 Low

CVSS3