CVE-2026-43435
Received Received - Intake
Linux Kernel Oneway Spam Detection Bypass

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix oneway spam detection The spam detection logic in TreeRange was executed before the current request was inserted into the tree. So the new request was not being factored in the spam calculation. Fix this by moving the logic after the new range has been inserted. Also, the detection logic for ArrayRange was missing altogether which meant large spamming transactions could get away without being detected. Fix this by implementing an equivalent low_oneway_space() in ArrayRange. Note that I looked into centralizing this logic in RangeAllocator but iterating through 'state' and 'size' got a bit too complicated (for me) and I abandoned this effort.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability relates to the Linux kernel's rust_binder component, specifically its spam detection logic for oneway transactions.

The issue was that the spam detection in TreeRange was performed before the new request was added to the tracking tree, so the new request was not considered in the spam calculation.

Additionally, the ArrayRange detection logic was missing entirely, allowing large spamming transactions to go undetected.

The fix involved moving the spam detection logic to after the new request insertion in TreeRange and implementing a similar detection mechanism for ArrayRange.


How can this vulnerability impact me? :

This vulnerability could allow large spamming transactions to bypass detection in the rust_binder component of the Linux kernel.

Such undetected spamming could lead to resource exhaustion or degraded system performance due to excessive oneway requests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart