Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-70088.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-70088
Upstream
Published
2025-11-12T22:15:47Z
Modified
2026-04-01T05:21:41.139194Z
Summary
CVE-2025-40201 affecting package kernel for versions less than 6.6.117.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

kernel/sys.c: fix the racy usage of tasklock(tsk->groupleader) in sys_prlimit64() paths

The usage of tasklock(tsk->groupleader) in sysprlimit64()->doprlimit() path is very broken.

sysprlimit64() does gettaskstruct(tsk) but this only protects taskstruct itself. If tsk != current and tsk is not a leader, this process can exit/exec and tasklock(tsk->groupleader) may use the already freed task_struct.

Another problem is that sysprlimit64() can race with mt-exec which changes ->groupleader. In this case doprlimit() may take the wrong lock, or (worse) ->groupleader may change between tasklock() and taskunlock().

Change sysprlimit64() to take tasklistlock when necessary. This is not nice, but I don't see a better fix for -stable.

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.117.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-70088.json"