CVE-2025-40201
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a race condition in the Linux kernel's sys_prlimit64() function. Specifically, the function uses task_lock(tsk->group_leader) in a way that is unsafe because the task_struct it references may be freed if the task is not the current process and not a leader. Additionally, sys_prlimit64() can race with multi-threaded exec operations that change the group_leader, potentially causing the function to take the wrong lock or have inconsistent locking behavior. The fix involves taking the tasklist_lock when necessary to prevent these race conditions.
How can this vulnerability impact me? :
This vulnerability can lead to race conditions in the kernel, which may cause incorrect locking and use of freed memory structures. This can result in kernel instability, crashes, or potentially allow attackers to exploit these conditions to cause denial of service or escalate privileges.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where sys_prlimit64() properly takes tasklist_lock to avoid race conditions. Therefore, the immediate step is to apply the latest kernel updates or patches that address this issue.