Impact
A race condition between the NFC LLCP send_ui_frame routine and the local_cleanup routine allows socket buffers to be queued into a transmission queue after it has been purged, resulting in unreleased memory for skb structures and associated NFC objects. The primary impact is gradual consumption of kernel memory, which could degrade performance or trigger a kernel OOM killer. There is no evidence of direct code execution or data exfiltration from the description.
Affected Systems
The flaw is present in the Linux kernel family in the NFC LLCP driver. All versions up to and including the 6.19 release candidate series (RC1 through RC7) are affected, as indicated by the listed CPE strings and the referenced source code patches. Any system running one of these kernel releases with the NFC driver enabled and operational is vulnerable.
Risk and Exploitability
The EPSS score is less than 1% and the vulnerability is not listed in CISA KEV, indicating a low likelihood of exploitation. The CVSS score of 5.5 reflects moderate overall risk. Based on the description, the likely attack path would require an attacker to trigger repeated calls to send_ui_frame—potentially by sending crafted NFC traffic or invoking user-space APIs that interact with the NFC subsystem—to accelerate memory exhaustion. This could lead to a denial-of-service condition. Attack scenarios remain largely inferred from the race condition details described in the patch notes.
OpenCVE Enrichment
Ubuntu USN