VYPR
Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Apr 18, 2026

CVE-2026-23291

CVE-2026-23291

Description

In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: properly drop the usb interface reference on disconnect

When the device is disconnected from the driver, there is a "dangling" reference count on the usb interface that was grabbed in the probe callback. Fix this up by properly dropping the reference after we are done with it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reference leak in the Linux kernel's NFC pn533 driver leaves a dangling USB interface reference on disconnect, potentially leading to use-after-free.

Vulnerability

In the Linux kernel's NFC subsystem, the pn533 driver fails to properly drop the USB interface reference that was acquired during probe when the device is disconnected. This creates a dangling reference count on the USB interface, which can lead to a use-after-free condition if the interface is later removed while the driver still holds a reference [1][2].

Exploitation

An attacker with physical access to the system could exploit this by repeatedly connecting and disconnecting a malicious NFC device that triggers the pn533 driver. The dangling reference prevents the USB interface from being properly cleaned up, potentially allowing the attacker to cause memory corruption or a kernel crash [3][4].

Impact

Successful exploitation could lead to a denial of service (system crash) or, in more severe cases, arbitrary code execution in the kernel context. The vulnerability is triggered during device disconnect, making it a local attack vector that requires physical presence or the ability to hot-plug USB devices.

Mitigation

The fix has been applied in the Linux kernel stable tree, with commits that properly drop the USB interface reference after disconnect [1][2][3][4]. Users should update to a kernel version containing these patches to mitigate the vulnerability.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.