CVE-2025-33235
Race Condition in NVIDIA Linux Resiliency Extension Enables Escalation
Publication date: 2025-12-16
Last updated on: 2026-02-02
Assigner: NVIDIA Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nvidia | resiliency_extension | 3.1 |
| nvidia | nvidia_resiliency_extension | to 0.5.0 (inc) |
| nvidia | nvidia_resiliency_extension | 0.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the NVIDIA Resiliency Extension for Linux, specifically in its checkpointing core. It is a race condition flaw where concurrent execution using shared resources is improperly synchronized. An attacker exploiting this flaw could cause information disclosure, data tampering, denial of service, or escalate their privileges. [2]
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to serious impacts including unauthorized disclosure of sensitive information, alteration or tampering of data, disruption of service (denial of service), and escalation of privileges allowing an attacker to gain higher access rights than intended. [2]