CVE-2026-23150
Memory Leak in Linux Kernel NFC LLCP Component Due to Race Condition
Publication date: 2026-02-14
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.8 (inc) to 5.10.249 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.123 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.7 (inc) to 6.12.69 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.9 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's NFC (Near Field Communication) subsystem, specifically in the function nfc_llcp_send_ui_frame().
The issue arises because there is no synchronization between the function nfc_llcp_send_ui_frame() and the cleanup function local_cleanup(). This lack of synchronization can cause memory buffers (skb) to be added to a queue after that queue has already been purged, leading to memory leaks.
The problem occurs when nfc_llcp_send_ui_frame() tries to allocate memory for sending a frame but fails due to an error set by nfc_llcp_socket_release(), which is called during cleanup. Because the cleanup function purges the transmission queue without proper locking, memory buffers can be lost and not freed properly.
The fix involves adding synchronization by holding a lock on the transmission queue and checking if the local structure is still valid before queuing memory buffers, preventing the memory leak.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks in the Linux kernel's NFC subsystem.
Memory leaks can cause increased memory usage over time, potentially leading to system instability, degraded performance, or crashes if the leaked memory accumulates significantly.
For systems relying on NFC functionality, this could result in unreliable NFC communication or failures in NFC-related operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves memory leaks related to NFC components in the Linux kernel, specifically in the nfc_llcp_send_ui_frame() function.
Detection can be done by monitoring kernel logs for messages indicating memory leaks or allocation failures related to NFC, such as errors from nfc_llcp_send_ui_frame() or kmemleak reports.
You can check for suspected memory leaks using the kernel's kmemleak interface with the following command:
- cat /sys/kernel/debug/kmemleak
Additionally, monitoring dmesg or kernel logs for messages like "llcp: nfc_llcp_send_ui_frame: Could not allocate PDU" or "kmemleak: new suspected memory leaks" can help detect the issue.
- dmesg | grep -i nfc_llcp_send_ui_frame
- dmesg | grep -i kmemleak
What immediate steps should I take to mitigate this vulnerability?
The vulnerability was fixed by adding proper synchronization between nfc_llcp_send_ui_frame() and local_cleanup() functions to prevent memory leaks.
Immediate mitigation steps include updating the Linux kernel to a version that contains this fix.
If updating is not immediately possible, consider disabling NFC functionality temporarily to avoid triggering the vulnerable code paths.
- Update your Linux kernel to the latest version that includes the fix for this vulnerability.
- Disable NFC modules or services until the update can be applied.