SB2026032577 - Use After Free in Linux kernel nfc
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use After Free (CVE-ID: CVE-2026-23372)
The vulnerability allows a local user to execute arbitrary code or cause a denial of service.
The vulnerability exists due to use-after-free in the NFC raw socket (rawsock) component when handling socket teardown. A local user can trigger a race condition by terminating a process during active NFC transmission, leading to use-after-free or leaked references.
Exploitation requires an active NFC transmission and process interruption via signal such as SIGKILL.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/3ae592ed91bb4b6b51df256b51045c13d2656049
- https://git.kernel.org/stable/c/722a28b635ec281bb08a23885223526d8e7d6526
- https://git.kernel.org/stable/c/78141b8832e16d80d09cbefb4258612db0777a24
- https://git.kernel.org/stable/c/d793458c45df2aed498d7f74145eab7ee22d25aa
- https://git.kernel.org/stable/c/da4515fc8263c5933ed605e396af91079806dc45
- https://git.kernel.org/stable/c/edc988613def90c5b558e025b1b423f48007be06