- Nvidia confirms a brand new bug in Container Toolkit, and GPU Operator
- The bug permits malicious actors to execute code remotely
- A repair was already deployed, so patch now
The Nvidia Container Toolkit for Linux, a set of instruments that enables devs to construct and run GPU-accelerated containers utilizing Docker, or different container runtimes, carries a vulnerability that enables menace actors to achieve entry to the host file system and thus execute malicious code remotely, run denial of service assaults, escalate privileges, steal delicate info, or tamper with the sufferer’s information.
The corporate confirmed the information in a safety advisory, noting each the Nvidia Container Toolkit, and Nvidia GPU Operator (a Kubernetes-native answer that automates the deployment, administration, and monitoring of Nvidia GPU assets in a Kubernetes cluster) are susceptible to the bug which is being tracked as CVE-2025-23359.
It was assigned a severity rating of 8.3, and was stated to have an effect on all variations of Container Toolkit as much as and together with 1.17.3, and all variations as much as and together with 24.9.1 of GPU Operator.
Patch bypass
The bugs had been fastened in variations 1.17.4 and 24.9.2 respectively. Additionally it is price mentioning that the flaw is barely current on Linux, and doesn’t influence use instances the place CDI is used.
Cybersecurity researchers from Wiz declare that is really a bypass for one more vulnerability. Apparently, the earlier bug is tracked as CVE-2024-0132, and has a 9.0 severity rating, making it important, because it may permit malicious actors to mount the host’s root file system right into a container, granting them free entry to just about something. What’s extra, the entry can be utilized to launch privileged containers and obtain full host compromise.
Nvidia says the difficulty was fastened in September 2024, and to handle the difficulty, customers are suggested to use the launched patches, and ensure to not disable the “–no-cntlibs” flag in manufacturing environments, it was stated.
By way of The Hacker Information