Description
In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: add missing return after LLCP_CLOSED checks

In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket
state is LLCP_CLOSED, the code correctly calls release_sock() and
nfc_llcp_sock_put() but fails to return. Execution falls through to
the remainder of the function, which calls release_sock() and
nfc_llcp_sock_put() again. This results in a double release_sock()
and a refcount underflow via double nfc_llcp_sock_put(), leading to
a use-after-free.

Add the missing return statements after the LLCP_CLOSED branches
in both functions to prevent the fall-through.
Published: 2026-04-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Use-after-Free
Action: Patch immediately
AI Analysis

Impact

In the Linux kernel's NFC LLCP implementation, two functions incorrectly fall through after handling a closed socket state. The code calls release_sock() and nfc_llcp_sock_put() twice, causing a reference count underflow and a use‑after‑free. This memory corruption can allow an attacker to execute arbitrary code or crash the system if the double release is triggered during normal operation.

Affected Systems

The vulnerability affects all Linux kernel builds that include the buggy nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc() functions. Any distribution that has not applied the patch commit adding the missing return statements remains vulnerable. The issue is present in the mainline kernel source before the upstream fix.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, but the EPSS score of less than 1% shows a low probability of real‑world exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the code path, the attack likely requires local or privileged access to trigger the double release; remote exploitation would need a vector that can manipulate NFC LLCP traffic against the target kernel.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that incorporates the patch adding the missing returns to nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc().
  • If an immediate kernel upgrade is not possible, disable NFC LLCP services or block NFC traffic to eliminate the code paths that can trigger the double release.
  • After updating or disabling the service, monitor system logs for any indications of kernel panics or use‑after‑free errors to verify that the issue no longer occurs.

Generated by OpenCVE AI on April 28, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-667

Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 27 Apr 2026 14:15:00 +0000


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock() and nfc_llcp_sock_put() but fails to return. Execution falls through to the remainder of the function, which calls release_sock() and nfc_llcp_sock_put() again. This results in a double release_sock() and a refcount underflow via double nfc_llcp_sock_put(), leading to a use-after-free. Add the missing return statements after the LLCP_CLOSED branches in both functions to prevent the fall-through.
Title nfc: llcp: add missing return after LLCP_CLOSED checks
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:30.689Z

Reserved: 2026-03-09T15:48:24.124Z

Link: CVE-2026-31629

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:42.217

Modified: 2026-04-27T20:36:33.277

Link: CVE-2026-31629

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31629 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses