Description
In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: ns: Limit the maximum server registration per node

Current code does no bound checking on the number of servers added per
node. A malicious client can flood NEW_SERVER messages and exhaust memory.

Fix this issue by limiting the maximum number of server registrations to
256 per node. If the NEW_SERVER message is received for an old port, then
don't restrict it as it will get replaced. While at it, also rate limit
the error messages in the failure path of qrtr_ns_worker().

Note that the limit of 256 is chosen based on the current platform
requirements. If requirement changes in the future, this limit can be
increased.
Published: 2026-05-19
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, the lack of bounds checking allowed an attacker to send an arbitrary number of NEW_SERVER messages, leading to unbounded memory allocation. This memory exhaustion can cause the system to become unresponsive or crash, representing a denial-of-service risk.

Affected Systems

All Linux kernel deployments are affected, regardless of distribution, as the vulnerability resides in the core kernel networking code. The fix limits registrations to 256 servers per node in the qrtr subsystem.

Risk and Exploitability

The vulnerability is exploitable by a hostile client that can communicate over the qrtr interface, potentially from the same host or a trusted network segment. The CVSS score of 7.0 indicates a high severity, and the EPSS score of < 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, but the lack of bounds checking still exposes the system to a local or network-initiated denial of service via memory exhaustion. The fix was deployed by kernel developers, indicating that a patch is both available and necessary.

Generated by OpenCVE AI on May 20, 2026 at 03:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the qrtr server registration limit patch
  • If a full kernel upgrade is delayed, consider disabling the qrtr subsystem or replacing it with a lightweight alternative
  • Configure monitoring to detect and alert on excessive NEW_SERVER traffic and sudden memory pressure

Generated by OpenCVE AI on May 20, 2026 at 03:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-400

Wed, 20 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Tue, 19 May 2026 13:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-400

Tue, 19 May 2026 11:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: qrtr: ns: Limit the maximum server registration per node Current code does no bound checking on the number of servers added per node. A malicious client can flood NEW_SERVER messages and exhaust memory. Fix this issue by limiting the maximum number of server registrations to 256 per node. If the NEW_SERVER message is received for an old port, then don't restrict it as it will get replaced. While at it, also rate limit the error messages in the failure path of qrtr_ns_worker(). Note that the limit of 256 is chosen based on the current platform requirements. If requirement changes in the future, this limit can be increased.
Title net: qrtr: ns: Limit the maximum server registration per node
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-19T10:44:23.832Z

Reserved: 2026-05-01T14:12:56.013Z

Link: CVE-2026-43491

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T12:16:18.747

Modified: 2026-05-19T12:16:18.747

Link: CVE-2026-43491

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-19T00:00:00Z

Links: CVE-2026-43491 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T03:45:21Z

Weaknesses