CVE-2026-31629

high

Description

In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock() and nfc_llcp_sock_put() but fails to return. Execution falls through to the remainder of the function, which calls release_sock() and nfc_llcp_sock_put() again. This results in a double release_sock() and a refcount underflow via double nfc_llcp_sock_put(), leading to a use-after-free. Add the missing return statements after the LLCP_CLOSED branches in both functions to prevent the fall-through.

References

https://git.kernel.org/stable/c/ff3d9e8f7244293e303f7b6ef70774291c7c27e9

https://git.kernel.org/stable/c/aba4712e8f0381cd5d196534ce2ad082626a5ab6

https://git.kernel.org/stable/c/8977fad2b3c6eefd414131168d597c5d1d5e1abf

https://git.kernel.org/stable/c/796e0cac058252d0ad34ebe288e6f7979b5fc9b2

Details

Source: Mitre, NVD

Published: 2026-04-24

Updated: 2026-04-24

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High