Количество 9
Количество 9
GHSA-f748-7hpg-88ch
NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system
CVE-2024-0133
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
CVE-2024-0133
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
CVE-2024-0133
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
BDU:2024-09498
Уязвимость программного обеспечения для создания и запуска контейнеров NVIDIA Container Toolkit и программного средства для управления ресурсами NVIDIA GPU Operator, позволяющая нарушителю изменить произвольные данные
ROS-20251030-02
Множественные уязвимости nvidia-container-toolkit
ROS-20251030-01
Множественные уязвимости nvidia-container
SUSE-SU-2025:4187-1
Security update for nvidia-container-toolkit
SUSE-SU-2024:3950-1
Security update for govulncheck-vulndb
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-f748-7hpg-88ch NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system | CVSS3: 4.1 | 1% Низкий | около 1 года назад | |
CVE-2024-0133 NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering. | CVSS3: 3.4 | 1% Низкий | около 1 года назад | |
CVE-2024-0133 NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering. | CVSS3: 4.1 | 1% Низкий | около 1 года назад | |
CVE-2024-0133 NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering. | CVSS3: 3.4 | 1% Низкий | около 1 года назад | |
BDU:2024-09498 Уязвимость программного обеспечения для создания и запуска контейнеров NVIDIA Container Toolkit и программного средства для управления ресурсами NVIDIA GPU Operator, позволяющая нарушителю изменить произвольные данные | CVSS3: 4.1 | 1% Низкий | почти 2 года назад | |
ROS-20251030-02 Множественные уязвимости nvidia-container-toolkit | CVSS3: 5.5 | около 1 месяца назад | ||
ROS-20251030-01 Множественные уязвимости nvidia-container | CVSS3: 5.5 | около 1 месяца назад | ||
SUSE-SU-2025:4187-1 Security update for nvidia-container-toolkit | 7 дней назад | |||
SUSE-SU-2024:3950-1 Security update for govulncheck-vulndb | около 1 года назад |
Уязвимостей на страницу