VYPR
Unrated severityNVD Advisory· Published May 19, 2026

CVE-2026-43491

CVE-2026-43491

Description

In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: ns: Limit the maximum server registration per node

Current code does no bound checking on the number of servers added per node. A malicious client can flood NEW_SERVER messages and exhaust memory.

Fix this issue by limiting the maximum number of server registrations to 256 per node. If the NEW_SERVER message is received for an old port, then don't restrict it as it will get replaced. While at it, also rate limit the error messages in the failure path of qrtr_ns_worker().

Note that the limit of 256 is chosen based on the current platform requirements. If requirement changes in the future, this limit can be increased.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A lack of bound checking in the Linux kernel's QRTR name service (qrtr_ns) allows a local attacker to exhaust kernel memory by flooding NEW_SERVER messages.

Vulnerability

The Linux kernel's Qualcomm IPC Router (QRTR) name service (qrtr_ns) contains a missing bounds check when handling NEW_SERVER messages [1]. The code inserts new server registrations per node without any limit, allowing an attacker to create an unbounded number of server entries. The fix, included in stable kernel updates, caps server registrations at 256 per node [1]. A NEW_SERVER message for an already-known port is replaced rather than added, so it is not restricted [1].

Exploitation

An attacker must have the ability to send crafted NEW_SERVER messages to the qrtr_ns socket (i.e., local access to the QRTR subsystem) [1]. By sending a continuous stream of unique NEW_SERVER messages, the attacker can cause the kernel to allocate memory for each new server entry, leading to memory exhaustion [1].

Impact

Successful exploitation results in denial of service (DoS) due to kernel memory exhaustion [1]. The attacker does not gain code execution or data access, but can render the system unstable or unresponsive.

Mitigation

Patches have been applied to the Linux kernel stable branches [1][2][3][4]. Users should update to a kernel version containing commit 35fb4a0c077c or an equivalent backport [4]. If patching is not immediately possible, restricting local access to QRTR services may limit the attack surface. There is no known workaround that fully prevents the vulnerability without applying the patch.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

10

Vulnerability mechanics

Synthesis attempt was rejected by the grounding validator. Re-run pending.

References

5

News mentions

0

No linked articles in our index yet.