Description
In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: complete pending data exchange on device close

In nci_close_device(), complete any pending data exchange before
closing. The data exchange callback (e.g.
rawsock_data_exchange_complete) holds a socket reference.

NIPA occasionally hits this leak:

unreferenced object 0xff1100000f435000 (size 2048):
comm "nci_dev", pid 3954, jiffies 4295441245
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
27 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 '..@............
backtrace (crc ec2b3c5):
__kmalloc_noprof+0x4db/0x730
sk_prot_alloc.isra.0+0xe4/0x1d0
sk_alloc+0x36/0x760
rawsock_create+0xd1/0x540
nfc_sock_create+0x11f/0x280
__sock_create+0x22d/0x630
__sys_socket+0x115/0x1d0
__x64_sys_socket+0x72/0xd0
do_syscall_64+0x117/0xfc0
entry_SYSCALL_64_after_hwframe+0x4b/0x53
Published: 2026-03-25
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Resource Leak / DoS
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel routine that closes an NFC device omitted the cleanup of resources tied to pending data exchanges. When a device is closed, an unreferenced memory object—specifically a socket structure held by the data‑exchange callback—is left behind. The accumulation of such leaked objects can consume kernel memory and potentially trigger denial‑of‑service conditions if triggered repeatedly.

Affected Systems

All Linux kernel builds that did not incorporate the commit adding the missing completion call in nci_close_device() are affected. The vulnerability exists in the kernel source before that change, so any distribution shipping the unpatched kernel is vulnerable. The problem is kernel‑level and applies to all vendors that provide the affected kernel release.

Risk and Exploitability

Exploitation requires privileges capable of closing an NFC device, i.e., kernel or driver‑level access. The EPSS score is below 1 % and the vulnerability is not listed in the KEV catalog, suggesting a low probability of active exploitation. Nevertheless, an attacker with sufficient access could repeatedly trigger the leak to exhaust memory, leading to degraded system availability. Updating the kernel removes the flaw entirely.

Generated by OpenCVE AI on March 26, 2026 at 13:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the patch for nci_close_device() (the commit referenced in the advisory).
  • If a direct update is not possible, apply the vendor‑provided backport or patch that restores the proper completion of pending data exchanges before device close.
  • After updating, verify the kernel version and use memory‑leak detection tools such as NIPA to confirm that no unreferenced objects remain; reboot if any leaks are detected.

Generated by OpenCVE AI on March 26, 2026 at 13:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-582

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-582

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nfc: nci: complete pending data exchange on device close In nci_close_device(), complete any pending data exchange before closing. The data exchange callback (e.g. rawsock_data_exchange_complete) holds a socket reference. NIPA occasionally hits this leak: unreferenced object 0xff1100000f435000 (size 2048): comm "nci_dev", pid 3954, jiffies 4295441245 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 27 00 01 40 00 00 00 00 00 00 00 00 00 00 00 00 '..@............ backtrace (crc ec2b3c5): __kmalloc_noprof+0x4db/0x730 sk_prot_alloc.isra.0+0xe4/0x1d0 sk_alloc+0x36/0x760 rawsock_create+0xd1/0x540 nfc_sock_create+0x11f/0x280 __sock_create+0x22d/0x630 __sys_socket+0x115/0x1d0 __x64_sys_socket+0x72/0xd0 do_syscall_64+0x117/0xfc0 entry_SYSCALL_64_after_hwframe+0x4b/0x53
Title nfc: nci: complete pending data exchange on device close
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:57:58.619Z

Reserved: 2026-01-13T15:37:45.996Z

Link: CVE-2026-23330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:30.263

Modified: 2026-04-18T09:16:19.023

Link: CVE-2026-23330

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23330 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:43Z

Weaknesses