Impact
A race exists between the NFC controller interface and the rfkill subsystem that can allow a user to close an NFC device file while its workqueue is still being destroyed. If the workqueue is freed before the device is unregistered from rfkill, the system may retain a dangling reference to freed memory, potentially leading to a kernel crash. The main consequence is a local denial of service that could reboot the system or corrupt kernel state. The vulnerability is not known to have a remote exploitation pathway.
Affected Systems
Linux kernel builds that have not yet integrated the 2026-23167 fix, including all release candidates of kernel 6.19 and earlier stable releases that predate the patch. The affected components are the NFC device core, the nci driver, and the rfkill subsystem.
Risk and Exploitability
The CVSS score of 4.7 indicates moderate severity, while the EPSS score of less than 1% reflects a low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog, and it appears to require local privilege to trigger. Attackers would need to open and close an NFC device—for example, by naming a tty on a device that remains after rfkill unregistering—as a precondition for the race. If successful, the system may panic or crash, causing denial of service, but no known exploit chain leads to arbitrary code execution.
OpenCVE Enrichment
Ubuntu USN