LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31629

CVE-2026-31629 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 27, 2026

Linux Kernel - Use After Free

Published: April 24, 2026Updated: April 27, 2026

Overview

Linux kernel contains a use-after-free caused by missing return statements after LLCP_CLOSED checks in nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), letting attackers trigger double release leading to memory corruption, exploit requires triggering specific socket states.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Attackers can cause use-after-free leading to potential memory corruption or denial of service.

Mitigation

Update to the latest Linux kernel version containing the fix for missing return statements after LLCP_CLOSED checks.

Details

CVE ID
CVE-2026-31629
Severity
High
CVSS Score
8.8
Type
use_after_free
Status
unconfirmed

CVSS Metrics

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H