First published: Thu Sep 26 2024(Updated: )
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Nvidia Nvidia Container Toolkit | <1.16.2 | |
Linux Linux kernel | ||
All of | ||
Nvidia Nvidia Gpu Operator | <24.6.2 | |
Linux Linux kernel | ||
Microsoft CBL Mariner 2.0 x64 | ||
Microsoft Azure Linux 3.0 ARM | ||
Microsoft Azure Kubernetes Service Node on Ubuntu Linux | ||
Microsoft CBL Mariner 2.0 ARM | ||
Microsoft Azure Kubernetes Service Node on Azure Linux | ||
Microsoft Azure Linux 3.0 x64 | ||
go/github.com/NVIDIA/nvidia-container-toolkit | <1.16.2 | 1.16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.