CVE-2026-23291
Description
In the Linux kernel, the following vulnerability has been resolved:
nfc: pn533: properly drop the usb interface reference on disconnect
When the device is disconnected from the driver, there is a "dangling" reference count on the usb interface that was grabbed in the probe callback. Fix this up by properly dropping the reference after we are done with it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reference leak in the Linux kernel's NFC pn533 driver leaves a dangling USB interface reference on disconnect, potentially leading to use-after-free.
Vulnerability
In the Linux kernel's NFC subsystem, the pn533 driver fails to properly drop the USB interface reference that was acquired during probe when the device is disconnected. This creates a dangling reference count on the USB interface, which can lead to a use-after-free condition if the interface is later removed while the driver still holds a reference [1][2].
Exploitation
An attacker with physical access to the system could exploit this by repeatedly connecting and disconnecting a malicious NFC device that triggers the pn533 driver. The dangling reference prevents the USB interface from being properly cleaned up, potentially allowing the attacker to cause memory corruption or a kernel crash [3][4].
Impact
Successful exploitation could lead to a denial of service (system crash) or, in more severe cases, arbitrary code execution in the kernel context. The vulnerability is triggered during device disconnect, making it a local attack vector that requires physical presence or the ability to hot-plug USB devices.
Mitigation
The fix has been applied in the Linux kernel stable tree, with commits that properly drop the USB interface reference after disconnect [1][2][3][4]. Users should update to a kernel version containing these patches to mitigate the vulnerability.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/00477cab053dc4816b99141d8fcca7a479cfebebnvd
- git.kernel.org/stable/c/12133a483dfa832241fbbf09321109a0ea8a520envd
- git.kernel.org/stable/c/4551d6cea00224ab65a0ef35e4e6da0e9c0a2d74nvd
- git.kernel.org/stable/c/5be8aa2bcfb53158436182db8dee9d0b8e5901e6nvd
- git.kernel.org/stable/c/6645b030b0c1fc5bf338bffb0044238f24b2f770nvd
- git.kernel.org/stable/c/7398d6570501edc55a50ece820f369ab3c1df2e7nvd
- git.kernel.org/stable/c/7ff14eb070f0efecb2606f8d7aa01b77d188e886nvd
- git.kernel.org/stable/c/d1f6d20b3c2642ec85ce6ea5da7155746c31c6d0nvd
News mentions
0No linked articles in our index yet.