CVE-2026-43491
Description
In the Linux kernel, the following vulnerability has been resolved:
net: qrtr: ns: Limit the maximum server registration per node
Current code does no bound checking on the number of servers added per node. A malicious client can flood NEW_SERVER messages and exhaust memory.
Fix this issue by limiting the maximum number of server registrations to 256 per node. If the NEW_SERVER message is received for an old port, then don't restrict it as it will get replaced. While at it, also rate limit the error messages in the failure path of qrtr_ns_worker().
Note that the limit of 256 is chosen based on the current platform requirements. If requirement changes in the future, this limit can be increased.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A lack of bound checking in the Linux kernel's QRTR name service (qrtr_ns) allows a local attacker to exhaust kernel memory by flooding NEW_SERVER messages.
Vulnerability
The Linux kernel's Qualcomm IPC Router (QRTR) name service (qrtr_ns) contains a missing bounds check when handling NEW_SERVER messages [1]. The code inserts new server registrations per node without any limit, allowing an attacker to create an unbounded number of server entries. The fix, included in stable kernel updates, caps server registrations at 256 per node [1]. A NEW_SERVER message for an already-known port is replaced rather than added, so it is not restricted [1].
Exploitation
An attacker must have the ability to send crafted NEW_SERVER messages to the qrtr_ns socket (i.e., local access to the QRTR subsystem) [1]. By sending a continuous stream of unique NEW_SERVER messages, the attacker can cause the kernel to allocate memory for each new server entry, leading to memory exhaustion [1].
Impact
Successful exploitation results in denial of service (DoS) due to kernel memory exhaustion [1]. The attacker does not gain code execution or data access, but can render the system unstable or unresponsive.
Mitigation
Patches have been applied to the Linux kernel stable branches [1][2][3][4]. Users should update to a kernel version containing commit 35fb4a0c077c or an equivalent backport [4]. If patching is not immediately possible, restricting local access to QRTR services may limit the attack surface. There is no known workaround that fully prevents the vulnerability without applying the patch.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
103efaad55cad1e6f6cd501fb5d5ee2ff9832235fb4a0c077c868202aa2ada868202aa2ada35fb4a0c077c3efaad55cad1e6f6cd501fb5d5ee2ff98322Vulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
5- git.kernel.org/stable/c/35fb4a0c077c5d1049c2628b769e0a1b1e65df0dnvd
- git.kernel.org/stable/c/3efaad55cad1ded429e3a873bfece389058a526bnvd
- git.kernel.org/stable/c/868202aa2adae427060a42d5bd663b4d782ec02cnvd
- git.kernel.org/stable/c/d5ee2ff98322337951c56398e79d51815acbf955nvd
- git.kernel.org/stable/c/e6f6cd501fb54060940a6eb3f4103eeb5e426ae7nvd
News mentions
0No linked articles in our index yet.