Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-31509— nfc: nci: fix circular locking dependency in nci_close_device

AI Predicted 3.3 Difficulty: Moderate EPSS 0.01% · P2

Possible ATT&CK Techniques 1AI

T1499 · Endpoint Denial of Service

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux6a2968aaf50c7a22fced77a5e24aa636281efca8< 7ed00a3edc8597fe2333f524401e2889aa1b5edfaffected
6a2968aaf50c7a22fced77a5e24aa636281efca8< 5eef9ebec7f5738f12cadede3545c05b34bf5ac3affected
6a2968aaf50c7a22fced77a5e24aa636281efca8< ca54e904a071aa65ef3ad46ba42d51aaac6b73b4affected
6a2968aaf50c7a22fced77a5e24aa636281efca8< eb435d150ca74b4d40f77f1a2266f3636ed64a79affected
6a2968aaf50c7a22fced77a5e24aa636281efca8< 1edc12d2bbcb7a8d0f1088e6fccb9d8c01bb1289affected
6a2968aaf50c7a22fced77a5e24aa636281efca8< d89b74bf08f067b55c03d7f999ba0a0e73177eb3affected
6a2968aaf50c7a22fced77a5e24aa636281efca8< 09143c0e8f3b03517e6233aad42f45c794d8df8eaffected
6a2968aaf50c7a22fced77a5e24aa636281efca8< 4527025d440ce84bf56e75ce1df2e84cb8178616affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-31509

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nfc: nci: fix circular locking dependency in nci_close_device
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix circular locking dependency in nci_close_device nci_close_device() flushes rx_wq and tx_wq while holding req_lock. This causes a circular locking dependency because nci_rx_work() running on rx_wq can end up taking req_lock too: nci_rx_work -> nci_rx_data_packet -> nci_data_exchange_complete -> __sk_destruct -> rawsock_destruct -> nfc_deactivate_target -> nci_deactivate_target -> nci_request -> mutex_lock(&ndev->req_lock) Move the flush of rx_wq after req_lock has been released. This should safe (I think) because NCI_UP has already been cleared and the transport is closed, so the work will see it and return -ENETDOWN. NIPA has been hitting this running the nci selftest with a debug kernel on roughly 4% of the runs.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nci_close_device中req_lock与工作队列的循环锁定依赖,可能导致死锁。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 6a2968aaf50c7a22fced77a5e24aa636281efca8 ~ 7ed00a3edc8597fe2333f524401e2889aa1b5edf -
LinuxLinux 3.2 -

II. Public POCs for CVE-2026-31509

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-31509

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-04-22 · 100 CVEs total

CVE-2026-314639.8 CRITICALiomap: fix invalid folio access when i_blkbits differs from I/O granularity
CVE-2026-314449.8 CRITICALksmbd: fix use-after-free and NULL deref in smb_grant_oplock()
CVE-2026-315019.8 CRITICALnet: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path
CVE-2026-314369.8 CRITICALdmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc()
CVE-2026-314789.8 CRITICALksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()
CVE-2026-314489.4 CRITICALext4: avoid infinite loops caused by residual data
CVE-2026-314328.8 HIGHksmbd: fix OOB write in QUERY_INFO for compound requests
CVE-2026-314338.8 HIGHksmbd: fix potencial OOB in get_file_all_info() for compound requests
CVE-2026-314508.8 HIGHext4: publish jinode after initialization
CVE-2026-314358.8 HIGHnetfs: Fix read abandonment during retry
CVE-2026-314768.2 HIGHksmbd: do not expire session on binding failure
CVE-2026-314648.1 HIGHscsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
CVE-2026-315138.1 HIGHBluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req
CVE-2026-314467.8 HIGHext4: fix use-after-free in update_super_work when racing with umount
CVE-2026-314497.8 HIGHext4: validate p_idx bounds in ext4_ext_correct_indexes
CVE-2026-315027.8 HIGHteam: fix header_ops type confusion with non-Ethernet ports
CVE-2026-314317.8 HIGHcrypto: algif_aead - Revert to operating out-of-place
CVE-2026-314887.8 HIGHdrm/amd/display: Do not skip unrelated mode changes in DSC validation
CVE-2026-314907.8 HIGHdrm/xe/pf: Fix use-after-free in migration restore
CVE-2026-314547.8 HIGHxfs: save ailp before dropping the AIL lock in push callbacks

Showing top 20 of 100 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-31509

No comments yet


Leave a comment