Vulnerability Description
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nvidia | Nvidia Container Toolkit | < 1.16.2 |
| Linux | Linux Kernel | - |
| Nvidia | Nvidia Gpu Operator | < 24.6.2 |
Related Weaknesses (CWE)
References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5582Vendor Advisory
FAQ
What is CVE-2024-0132?
CVE-2024-0132 is a vulnerability with a CVSS score of 9.0 (CRITICAL). NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access...
How severe is CVE-2024-0132?
CVE-2024-0132 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-0132?
Check the references section above for vendor advisories and patch information. Affected products include: Nvidia Nvidia Container Toolkit, Linux Linux Kernel, Nvidia Nvidia Gpu Operator.