First published: Thu Sep 26 2024(Updated: )
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Linux 3.0 ARM | ||
Microsoft Azure Kubernetes Service Node on Ubuntu Linux | ||
Microsoft Azure Linux 3.0 x64 | ||
Microsoft Azure Kubernetes Service Node on Azure Linux | ||
go/github.com/NVIDIA/nvidia-container-toolkit | <1.16.2 | 1.16.2 |
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
All of | ||
NVIDIA Container Toolkit | <1.16.2 | |
Linux Kernel | ||
All of | ||
NVIDIA GPU Operator | <24.6.2 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0132 is considered a critical vulnerability that allows a crafted container image to gain access to the host file system.
To mitigate CVE-2024-0132, upgrade the NVIDIA Container Toolkit to version 1.16.2 or later.
CVE-2024-0132 affects NVIDIA Container Toolkit versions 1.16.1 and earlier, particularly when used with default configurations in various environments, including Azure Kubernetes and CBL Mariner.
CVE-2024-0132 is a Time-of-check Time-of-use (TOCTOU) vulnerability.
No, CVE-2024-0132 does not impact use cases where Container Device Interface (CDI) is utilized.