First published: Tue Jan 28 2025(Updated: )
NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code obtaining read and write access to host devices. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Container Toolkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0136 has been assigned a high severity rating due to its potential for allowing untrusted code to access host devices.
To mitigate CVE-2024-0136, ensure that the NVIDIA Container Toolkit is configured with default settings and avoid using nondefault configurations.
CVE-2024-0136 could lead to unauthorized read and write access to host devices from untrusted container images.
Users of NVIDIA Container Toolkit who have configured it in a nondefault manner are affected by CVE-2024-0136.
CVE-2024-0136 was reported in early 2024, highlighting the need for immediate attention from affected users.