<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nvidia-container-toolkit</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:4187-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-24T07:58:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-24T07:58:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-24T07:58:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nvidia-container-toolkit</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nvidia-container-toolkit fixes the following issues:

- Update to version 1.18.0:
  - This is a major release and includes the following high-level changes:
    - The default mode of the NVIDIA Container Runtime has been updated to make use
      of a just-in-time-generated CDI specification instead of defaulting to the legacy mode.
    - Added a systemd unit to generate CDI specifications for available devices automatically. This allows
      native CDI support in container engines such as Docker and Podman to be used without additional steps.
  
- Security issues fixed:
  - CVE-2024-0133: Fixed data tampering in host file system via specially
    crafted container image (bsc#1231032)
  - CVE-2024-0132: Fixed time-of-check time-of-use (TOCTOU) race condition
    in default configuration via specifically crafted container image
    (bsc#1231033)
  - CVE-2024-0134: Fixed specially-crafted container image can lead to
    the creation of unauthorized files on the host (bsc#1232855)
  - CVE-2024-0135: Fixed Improper Isolation or Compartmentalization in
    NVIDIA Container Toolkit (bsc#1236496)
  - CVE-2024-0136: Fixed Improper Isolation or Compartmentalization in
    NVIDIA Container Toolkit (bsc#1236497)
  - CVE-2024-0137: Fixed Improper Isolation or Compartmentalization in
    NVIDIA Container Toolkit (bsc#1236498)
  - CVE-2025-23359: Fixed TOCTOU Vulnerability in NVIDIA Container Toolkit
    (bsc#1237085)
  - CVE-2025-23267: Fixed link following can lead to container escape
    (bsc#1246614)
  - CVE-2025-23266: Fixed hook initialization might lead to escalation
    of privileges (bsc#1246860)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-4187,SUSE-SLE-Module-Containers-15-SP6-2025-4187,SUSE-SLE-Module-Containers-15-SP7-2025-4187,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4187,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4187,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4187,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4187,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4187,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4187,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4187,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4187,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4187,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4187,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4187,SUSE-Storage-7.1-2025-4187,openSUSE-SLE-15.6-2025-4187</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      <Description>Link for SUSE-SU-2025:4187-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-November/023342.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:4187-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231032</URL>
      <Description>SUSE Bug 1231032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231033</URL>
      <Description>SUSE Bug 1231033</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232855</URL>
      <Description>SUSE Bug 1232855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236496</URL>
      <Description>SUSE Bug 1236496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236497</URL>
      <Description>SUSE Bug 1236497</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236498</URL>
      <Description>SUSE Bug 1236498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237085</URL>
      <Description>SUSE Bug 1237085</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246614</URL>
      <Description>SUSE Bug 1246614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246860</URL>
      <Description>SUSE Bug 1246860</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0132/</URL>
      <Description>SUSE CVE CVE-2024-0132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0133/</URL>
      <Description>SUSE CVE CVE-2024-0133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0134/</URL>
      <Description>SUSE CVE CVE-2024-0134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0135/</URL>
      <Description>SUSE CVE CVE-2024-0135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0136/</URL>
      <Description>SUSE CVE CVE-2024-0136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0137/</URL>
      <Description>SUSE CVE CVE-2024-0137 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23266/</URL>
      <Description>SUSE CVE CVE-2025-23266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23267/</URL>
      <Description>SUSE CVE CVE-2025-23267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-23359/</URL>
      <Description>SUSE CVE CVE-2025-23359 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp5">SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp5">SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP6" CPE="cpe:/o:suse:sle-module-containers:15:sp6">SUSE Linux Enterprise Module for Containers 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP7" CPE="cpe:/o:suse:sle-module-containers:15:sp7">SUSE Linux Enterprise Module for Containers 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp4">SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp5">SUSE Linux Enterprise Server 15 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4" CPE="cpe:/o:suse:sles_sap:15:sp4">SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP5" CPE="cpe:/o:suse:sles_sap:15:sp5">SUSE Linux Enterprise Server for SAP Applications 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nvidia-container-toolkit-1.18.0-150200.5.17.1">
      <FullProductName ProductID="nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Module for Containers 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Module for Containers 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server 15 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-container-toolkit-1.18.0-150200.5.17.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1">nvidia-container-toolkit-1.18.0-150200.5.17.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0132.html</URL>
        <Description>CVE-2024-0132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231033</URL>
        <Description>SUSE Bug 1231033</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0133.html</URL>
        <Description>CVE-2024-0133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231032</URL>
        <Description>SUSE Bug 1231032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit and NVIDIA GPU Operator for Linux contain a UNIX vulnerability where a specially crafted container image can lead to the creation of unauthorized files on the host. The name and location of the files cannot be controlled by an attacker. A successful exploit of this vulnerability might lead to data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0134.html</URL>
        <Description>CVE-2024-0134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232855</URL>
        <Description>SUSE Bug 1232855</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to modification of a host binary. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0135.html</URL>
        <Description>CVE-2024-0135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236496</URL>
        <Description>SUSE Bug 1236496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code obtaining read and write access to host devices. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0136.html</URL>
        <Description>CVE-2024-0136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236497</URL>
        <Description>SUSE Bug 1236497</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code running in the host's network namespace. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to denial of service and escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2024-0137</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0137.html</URL>
        <Description>CVE-2024-0137</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236498</URL>
        <Description>SUSE Bug 1236498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-23266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23266.html</URL>
        <Description>CVE-2025-23266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246860</URL>
        <Description>SUSE Bug 1246860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit for all platforms contains a vulnerability in the update-ldcache hook, where an attacker could cause a link following by using a specially crafted container image. A successful exploit of this vulnerability might lead to data tampering and denial of service.</Note>
    </Notes>
    <CVE>CVE-2025-23267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23267.html</URL>
        <Description>CVE-2025-23267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246614</URL>
        <Description>SUSE Bug 1246614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2025-23359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 15 SP7:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
        <ProductID>openSUSE Leap 15.6:nvidia-container-toolkit-1.18.0-150200.5.17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254187-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-23359.html</URL>
        <Description>CVE-2025-23359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237085</URL>
        <Description>SUSE Bug 1237085</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
