Improper Isolation or Compartmentalization Affecting github.com/nvidia/nvidia-container-toolkit/cmd/nvidia-container-runtime-hook package, versions <1.17.3


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMNVIDIANVIDIACONTAINERTOOLKITCMDNVIDIACONTAINERRUNTIMEHOOK-8669381
  • published29 Jan 2025
  • disclosed28 Jan 2025
  • creditAndres Riancho, Ronen Shustin, and Shir Tamari

Introduced: 28 Jan 2025

NewCVE-2024-0137  (opens in a new tab)
CWE-653  (opens in a new tab)

How to fix?

Upgrade github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime-hook to version 1.17.3 or higher.

Overview

Affected versions of this package are vulnerable to Improper Isolation or Compartmentalization where a specially crafted container image could lead to untrusted code running in the host’s network namespace. Note: This is only exploitable if the NVIDIA Container Toolkit is configured in a nondefault way.

CVSS Scores

version 4.0
version 3.1