Critical flaw in NVIDIA Container Toolkit allows full host takeover

Message boards : Number crunching : Critical flaw in NVIDIA Container Toolkit allows full host takeover
Message board moderation

To post messages, you must log in.

AuthorMessage
Dr Who Fan
Volunteer tester
Avatar

Send message
Joined: 8 Jan 01
Posts: 3343
Credit: 715,342
RAC: 4
United States
Message 2141412 - Posted: 29 Sep 2024, 21:15:50 UTC

Critical flaw in NVIDIA Container Toolkit allows full host takeover
The security issue is tracked as CVE-2024-0132 and allows an adversary to perform container escape attacks and gain full access to the host system, where they could execute commands or exfiltrate sensitive information.

...

The problem is a lack of secure isolation of the containerized GPU from the host, allowing containers to mount sensitive parts of the host filesystem or access runtime resources like Unix sockets for inter-process communication.

While most filesystems are mounted with “read-only” permissions, certain Unix sockets such as ‘docker.sock’ and ‘containerd.sock’ remain writable, allowing direct interactions with the host, including command execution.

Impacted users are recommended to upgrade to NVIDIA Container Toolkit version 1.16.2 and NVIDIA GPU Operator 24.6.2.
ID: 2141412 · Report as offensive     Reply Quote

Message boards : Number crunching : Critical flaw in NVIDIA Container Toolkit allows full host takeover


 
©2024 University of California
 
SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.