Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfc: rawsock: cancel tx_work before socket teardown In rawsock_release(), cancel any pending tx_work and purge the write queue before orphaning the socket. rawsock_tx_work runs on the system workqueue and calls nfc_data_exchange which dereferences the NCI device. Without synchronization, tx_work can race with socket and device teardown when a process is killed (e.g. by SIGKILL), leading to use-after-free or leaked references. Set SEND_SHUTDOWN first so that if tx_work is already running it will see the flag and skip transmitting, then use cancel_work_sync to wait for any in-progress execution to finish, and finally purge any remaining queued skbs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.1.1, < 5.10.253 |
References
- https://git.kernel.org/stable/c/3ae592ed91bb4b6b51df256b51045c13d2656049Patch
- https://git.kernel.org/stable/c/722a28b635ec281bb08a23885223526d8e7d6526Patch
- https://git.kernel.org/stable/c/78141b8832e16d80d09cbefb4258612db0777a24Patch
- https://git.kernel.org/stable/c/9b2d23cd09e1cb56bdf0e4d5614703094159f16cPatch
- https://git.kernel.org/stable/c/cdeed45ce8c92defd057f7d67ee9a69374d8fa16Patch
- https://git.kernel.org/stable/c/d793458c45df2aed498d7f74145eab7ee22d25aaPatch
- https://git.kernel.org/stable/c/da4515fc8263c5933ed605e396af91079806dc45Patch
- https://git.kernel.org/stable/c/edc988613def90c5b558e025b1b423f48007be06Patch
FAQ
What is CVE-2026-23372?
CVE-2026-23372 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: nfc: rawsock: cancel tx_work before socket teardown In rawsock_release(), cancel any pending tx_work and purge the write queue bef...
How severe is CVE-2026-23372?
CVE-2026-23372 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23372?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.