{"id":"CVE-2024-0133","details":"NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.","aliases":["GHSA-f748-7hpg-88ch","GO-2024-3237"],"modified":"2026-04-10T05:07:51.082782Z","published":"2024-09-26T06:15:04.053Z","related":["CGA-qqv4-68p4-qmwx","SUSE-SU-2024:3950-1","SUSE-SU-2025:4187-1","SUSE-SU-2026:0558-1","openSUSE-SU-2024:0350-1","openSUSE-SU-2024:14458-1"],"references":[{"type":"ADVISORY","url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5582"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.16.2"}]},{"events":[{"introduced":"0"},{"fixed":"24.6.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0133.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N"}]}