CVE-2025-40201 — Race Condition in Linux
Severity
3.2LOWOSV
No vectorEPSS
0.0%
top 94.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 12
Latest updateApr 9
Description
In the Linux kernel, the following vulnerability has been resolved:
kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
The usage of task_lock(tsk->group_leader) in sys_prlimit64()->do_prlimit()
path is very broken.
sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct
itself. If tsk != current and tsk is not a leader, this process can exit/exec
and task_lock(tsk->group_leader) may use the already freed task_struct.
Another problem…
Affected Packages7 packages
▶CVEListV5linux/linux18c91bb2d87268d23868bf13508f5bc9cf04e89a — 1bc0d9315ef5296abb2c9fd840336255850ded18+5