8.4

CVE-2025-33225

Medienbericht
NVIDIA Resiliency Extension for Linux contains a vulnerability in log aggregation, where an attacker could cause predictable log-file names. A successful exploit of this vulnerability may lead to escalation of privileges, code execution, denial of service, information disclosure, and data tampering.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NvidiaNvidia Resiliency Extension Version < 0.5.0
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc1
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc2
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc3
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc4
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc5
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc6
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc7
   LinuxLinux Kernel Version-
NvidiaNvidia Resiliency Extension Version0.5.0 Updaterc8
   LinuxLinux Kernel Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@nvidia.com 8.4 2.5 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-61 UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.