URL has been copied successfully!
Incomplete patching leaves Nvidia, Docker exposed to DOS attacks
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Incomplete patching leaves Nvidia, Docker exposed to DOS attacks

Mitigations include restricting Docker access: CVE-2024-0132 first received a fix in September 2024, which did not fully patch the flaw and left a patch bypass issue tracked as CVE-2025-23359. Nvidia fixed the bypass in February which Trend Micro believes to be lacking.The problem is that the fix, issued with the version 1.17.4 update, includes an optional feature flag “allow-cuda-compat-libs-from-containers” to roll back to unpatched settings, which will realize CVE-2024-0132. Queries emailed to Nvidia over patch incompleteness did not elicit a response until the publishing of this article. To fully protect systems from exploitation, Trend Micro recommends disabling this optional feature at all times. Additionally, to ward off DOS attempts, access to Docker API must be limited to authorized personnel only.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3962744/incomplete-patching-leaves-nvidia-docker-exposed-to-dos-attacks.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link