Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/NVIDIA/nvidia-container-toolkit
  4. ›
  5. GHSA-g4pj-mx9f-m2mh

GHSA-g4pj-mx9f-m2mh: Duplicate Advisory: NVIDIA Container Toolkit allows specially crafted container image to create empty files on the host file system

September 26, 2024 (updated October 29, 2024)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-f748-7hpg-88ch. This link is maintained to preserve external references.

Original Description

NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.

References

  • github.com/advisories/GHSA-g4pj-mx9f-m2mh
  • nvd.nist.gov/vuln/detail/CVE-2024-0133
  • nvidia.custhelp.com/app/answers/detail/a_id/5582

Code Behaviors & Features

Detect and mitigate GHSA-g4pj-mx9f-m2mh with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.16.2

Fixed versions

  • 1.16.2

Solution

Upgrade to version 1.16.2 or above.

Impact 4.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition

Source file

go/github.com/NVIDIA/nvidia-container-toolkit/GHSA-g4pj-mx9f-m2mh.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:08 +0000.