CVE-2026-43435
Linux Kernel Oneway Spam Detection Bypass
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's rust_binder component, specifically its spam detection logic for oneway transactions.
The issue was that the spam detection in TreeRange was performed before the new request was added to the tracking tree, so the new request was not considered in the spam calculation.
Additionally, the ArrayRange detection logic was missing entirely, allowing large spamming transactions to go undetected.
The fix involved moving the spam detection logic to after the new request insertion in TreeRange and implementing a similar detection mechanism for ArrayRange.
How can this vulnerability impact me? :
This vulnerability could allow large spamming transactions to bypass detection in the rust_binder component of the Linux kernel.
Such undetected spamming could lead to resource exhaustion or degraded system performance due to excessive oneway requests.