CVE-2026-31509

MEDIUM

nfc: nci: fix circular locking dependency in nci_close_device

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix circular locking dependency in nci_close_device nci_close_device() flushes rx_wq and tx_wq while holding req_lock. This causes a circular locking dependency because nci_rx_work() running on rx_wq can end up taking req_lock too: nci_rx_work -> nci_rx_data_packet -> nci_data_exchange_complete -> __sk_destruct -> rawsock_destruct -> nfc_deactivate_target -> nci_deactivate_target -> nci_request -> mutex_lock(&ndev->req_lock) Move the flush of rx_wq after req_lock has been released. This should safe (I think) because NCI_UP has already been cleared and the transport is closed, so the work will see it and return -ENETDOWN. NIPA has been hitting this running the nci selftest with a debug kernel on roughly 4% of the runs.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 1.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-667
Status published
Products (21)
Linux/Linux < 3.2
Linux/Linux 3.2
Linux/Linux 5.10.253 - 5.10.*
Linux/Linux 5.15.203 - 5.15.*
Linux/Linux 6.1.168 - 6.1.*
Linux/Linux 6.12.80 - 6.12.*
Linux/Linux 6.18.21 - 6.18.*
Linux/Linux 6.19.11 - 6.19.*
Linux/Linux 6.6.131 - 6.6.*
Linux/Linux 6a2968aaf50c7a22fced77a5e24aa636281efca8 - 09143c0e8f3b03517e6233aad42f45c794d8df8e
... and 11 more
Published Apr 22, 2026
Tracked Since Apr 22, 2026