Authored by Jann Horn, Google Security Research

An LSM can prevent the fcntl/close race cleanup path in fcntl_setlk() from working, leading to use-after-free read in lock_get_status() when reading /proc/locks.

advisories | CVE-2024-41012, CVE-2024-41020