{"id":169090,"date":"2024-09-30T08:14:58","date_gmt":"2024-09-30T08:14:58","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=169090"},"modified":"2024-09-30T08:15:01","modified_gmt":"2024-09-30T08:15:01","slug":"nvidia-container-toolkit-critical-flaw","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/169090\/uncategorized\/nvidia-container-toolkit-critical-flaw.html","title":{"rendered":"Critical NVIDIA Container Toolkit flaw could allow access to the underlying host"},"content":{"rendered":"
<\/div>\n
A critical vulnerability in the NVIDIA Container Toolkit could allow a container to escape and gain full access to the underlying host.<\/h2>\n\n\n\n
Critical vulnerability CVE-2024-0132 (CVSS score 9.0) in the NVIDIA Container Toolkit could allow an attacker to escape the container and gain full access to the underlying host.<\/p>\n\n\n\n
The vulnerability is a Time-of-check Time-of-Use (TOCTOU) issue that impacts NVIDIA Container Toolkit 1.16.1 or earlier. <\/p>\n\n\n\n