CVE-2026-43434
Memory Corruption in Linux Kernel Rust Binder
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Rust Binder component. When Rust Binder installs missing pages or removes them, it looks up a virtual memory area (vma) by address. However, if the original vma has been closed and replaced by a different one at the same address, Rust Binder might mistakenly install pages into the wrong vma.
Because of this, it becomes possible to write to binder pages that are normally read-only. Although the design intended that even if writing was possible it would not cause harm, another bug makes this unsafe.
The fix involves storing a pointer in vm_private_data and verifying that the vma returned by vma_lookup() has the correct vm_ops and vm_private_data before using it. This prevents Rust Binder from interacting with incorrect vmas.
How can this vulnerability impact me? :
This vulnerability can allow a user to write to binder pages that should be read-only. This unintended write access could potentially lead to unexpected behavior or security issues within the system, as the Rust Binder component may interact with incorrect memory areas.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by adding checks on the ownership of the virtual memory area (vma) before using it in Rust Binder. To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.
The fix involves storing a pointer in vm_private_data and verifying that the vma returned by vma_lookup() has the correct vm_ops and vm_private_data before usage, preventing Rust Binder from interacting with incorrect vmas.