7.8
CVE-2025-33235
- EPSS 0.01%
- Veröffentlicht 16.12.2025 17:38:27
- Zuletzt bearbeitet 02.02.2026 16:12:01
- Quelle psirt@nvidia.com
- CVE-Watchlists
- Unerledigt
NVIDIA Resiliency Extension for Linux contains a vulnerability in the checkpointing core, where an attacker may cause a race condition. A successful exploit of this vulnerability might lead to information disclosure, data tampering, denial of service, or escalation of privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nvidia ≫ Nvidia Resiliency Extension Version < 0.5.0
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc1
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc2
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc3
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc4
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc5
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc6
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc7
Nvidia ≫ Nvidia Resiliency Extension Version0.5.0 Updaterc8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.02 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7 | 1 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| psirt@nvidia.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.