Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN454
_____________________________________________________________________

DATE                : 17/07/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running NVIDIA® Container Toolkit
                              and GPU Operator.

=====================================================================
https://nvidia.custhelp.com/app/answers/detail/a_id/5659
_____________________________________________________________________


Security Bulletin: NVIDIA Container Toolkit - July 2025
Updated 07/13/2025 08:56 AM

NVIDIA has released a software update for NVIDIA® Container Toolkit
and GPU Operator. 

To protect your system, install the software update as described in
the installation section of the NVIDIA Container Toolkit
documentation and the NVIDIA GPU Operator documentation.

Go to NVIDIA Product Security.


Details

This section provides a summary of potential vulnerabilities that this
security update addresses and their impact. Descriptions use CWE™,
and base scores and vectors use CVSS v3.1 standards.

 
CVE ID	Description   Vector   Base Score    Severity   CWE    Impacts

CVE-2025-23266	NVIDIA Container Toolkit for all platforms contains
a vulnerability in some hooks used to initialize the container, where
an attacker could execute arbitrary code with elevated permissions.
A successful exploit of this vulnerability might lead to escalation
of privileges, data tampering, information disclosure, and denial of
service.	AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H	9.0
Critical	CWE‑426      Escalation of privileges, data tampering,
information disclosure, denial of service

CVE-2025-23267	NVIDIA Container Toolkit for all platforms contains a
vulnerability in the update-ldcache hook, where an attacker could
cause a link following by using a specially crafted container image.
A successful exploit of this vulnerability might lead to data
tampering and denial of service.    AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H	8.5
High	CWE‑59	Data tampering, denial of service


Security Updates

The following table lists the NVIDIA products affected, versions
affected, and the updated version that includes this security update.


CVE IDs Addressed   Affected Products   Platform or OS 
Affected Versions    Updated Version

CVE-2025-23266
CVE-2025-23267
	NVIDIA Container Toolkit    All    All versions up to and
including 1.17.7 (CDI mode only for versions prior to 1.17.5)
     1.17.8

       NVIDIA GPU Operator   Linux    All versions up to and
including 25.3.0 (CDI mode only for versions prior to 25.3.0)
     25.3.1


Mitigations

The vulnerabilities can be mitigated by opting out of the use of
the enable-cuda-compat hook.


Mitigations for NVIDIA Container Runtime

When using the NVIDIA Container Runtime in legacy mode, you can
opt out of the use of the enable-cuda-compat hook by editing the
/etc/nvidia-container-toolkit/config.toml file to set the
features.disable-cuda-compat-lib-hook feature flag to true:

[features]
disable-cuda-compat-lib-hook = true


Mitigations for NVIDIA GPU Operator

When using the NVIDIA GPU Operator, you can opt out of the use
of the enable-cuda-compat hook by adding disable-cuda-compat-lib-hook
to the NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES environment variable
in the Toolkit Container. To change this environment variable,
include the following arguments when installing or upgrading the
NVIDIA GPU Operator with Helm:

--set "toolkit.env[0].name=NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES" \
--set "toolkit.env[0].value=disable-cuda-compat-lib-hook"

Note:

Any other features flags that are required should be comma-separated
in the --set "toolkit.env[0].value” flag.

When using a GPU Operator version prior to 25.3.1, you can deploy
NVIDIA Container Toolkit 1.17.8 by including the following arguments
when installing or upgrading the GPU Operator with Helm. 

--set "toolkit.version=v1.17.8-ubuntu20.04"

Note:

For Red Hat Enterprise Linux or Red Hat OpenShift, you must specify
the v1.17.8-ubi8 tag.

Notes
To protect your system, install the software update as described
in the installation section of the NVIDIA Container Toolkit
documentation and the NVIDIA GPU Operator documentation.


Acknowledgements

NVIDIA thanks the following

CVE-2025-23266: Nir Ohfeld (@nirohfeld) and Shir Tamari (@shirtamari)
working with Trend Zero Day Initiative

CVE-2025-23267: Lei Wang & Min Yao (Nebula Security Lab, Huawei Cloud)
Get the Most Up-to-Date Product Security Information


Visit the NVIDIA Product Security page to

    Subscribe to security bulletin notifications
    See the current list of NVIDIA security bulletins
    Report a potential security issue in any NVIDIA supported product
    Learn more about the vulnerability management process followed by
the NVIDIA Product Security Incident Response Team (PSIRT)


Revision History

Revision	Date	Description
1.0	15 July 2025	Initial release


Support

If you have any questions about this security bulletin, contact
NVIDIA Support.

Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES,
DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND
SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO
WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT
TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS
AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF
TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A
PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED
TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information is believed to be accurate and reliable at the time
it is furnished. However, NVIDIA Corporation assumes no responsibility
for the consequences of use of such information or for any
infringement of patents or other rights of third parties that may
result from its use. No license is granted by implication or
otherwise under any patent or patent rights of NVIDIA Corporation.
Specifications mentioned in this publication are subject to change
without notice. This publication supersedes and replaces all
information previously supplied. NVIDIA Corporation products are
not authorized for use as critical components in life support
devices or systems without express written approval of NVIDIA
Corporation.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
