NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04971}

epss

{'score': 0.05451}


Wed, 02 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Nvidia nvidia Container Toolkit
Nvidia nvidia Gpu Operator
CPEs cpe:2.3:a:nvidia:nvidia_container_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:nvidia:nvidia_gpu_operator:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Nvidia nvidia Container Toolkit
Nvidia nvidia Gpu Operator

Thu, 26 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Critical

threat_severity

Important


Thu, 26 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Nvidia
Nvidia container Toolkit
Nvidia gpu Operator
CPEs cpe:2.3:a:nvidia:container_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:nvidia:gpu_operator:*:*:*:*:*:*:*:*
Vendors & Products Nvidia
Nvidia container Toolkit
Nvidia gpu Operator
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 09:45:00 +0000

Type Values Removed Values Added
Title nvidia-container-toolkit: Time-of-check Time-of-use (TOCTOU) Race Condition in NVIDIA Container toolkit
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 26 Sep 2024 05:45:00 +0000

Type Values Removed Values Added
Description NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2024-09-27T03:55:16.649Z

Reserved: 2023-12-02T00:42:43.107Z

Link: CVE-2024-0132

cve-icon Vulnrichment

Updated: 2024-09-26T13:36:21.851Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-26T06:15:02.397

Modified: 2024-10-02T14:45:36.160

Link: CVE-2024-0132

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-26T06:15:02Z

Links: CVE-2024-0132 - Bugzilla

cve-icon OpenCVE Enrichment

No data.