Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Google says it will sign the EU AI practice code

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find new exploits that bypass vulnerabilities in patched NVIDIA container toolkit
Identity

Researchers find new exploits that bypass vulnerabilities in patched NVIDIA container toolkit

userBy userFebruary 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 12, 2025Ravi LakshmananContainer Security/Vulnerabilities

nvidia container toolkit vulnerability

Cybersecurity researchers have escaping container isolation protection and bypassing current patched security vulnerabilities in the Nvidia Container Toolkit that could be leveraged to gain full access to the underlying host. I discovered it.

The new vulnerability is tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the next version –

nvidia Container Toolkit (all versions up to 1.17.3) – Fixed in version 1.17.4 NVIDIA GPU operator (all versions up to 24.9.1) – Fixed in version 24.9.2

Cybersecurity

“The Nvidia Container Toolkit for Linux contains a vulnerability for time used (Toctou) when used in the default configuration. This means that crafted container images access the host file system It could be possible,” the company said in its advisory. Tuesday.

“Successful use of this vulnerability could lead to code execution, denial of service, escalation of privileges, disclosure of information, and data tampering.”

Wiz, a cloud security company that shared additional technical details of the flaw, said it was bypassing another vulnerability (CVE-2024-0132, CVSS score: 9.0) addressed by NVIDIA in September 2024 Ta.

In short, the vulnerability allows bad actors to mount the host’s root file system in a container, allowing free access to all files. Additionally, access can be used to launch privileged containers and achieve full host compromises through runtime UNIX sockets.

Wiz Researchers’ security researchers Shir Tamari, Ronen Shustin, and Andres Riancho said in the source code analysis of the container toolkit, the file path used during the mount operation is symbolic to allow the file path to be mounted from outside the container. I discovered that I can use links to manipulate it. (i.e., the root directory) to the path in “/usr/lib64”.

Cybersecurity

Access to the host filesystem provided by container escape is read-only, but this restriction can be avoided by interacting with UNIX sockets to generate a new privileged container and gaining unlimited access to the filesystem.

“This level of access also allowed us to monitor network traffic, debug active processes and perform a variety of other host-level operations,” the researchers said.

In addition to updating to the latest version, NVIDIA Container Toolkit users are advised not to disable the “-No-CNTLIBS” flag in their production environment.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAdobe launches a FireflyAI subscription
Next Article Baidu will launch the Ernie 5 Next Generation AI model later this year amid growing competition with Deepseek and Bytedance
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

July 30, 2025

Look inside Pillar’s AI security platform

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.