CVE-2026-23194: In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle FDA objects of length
Summary
A bug in the Linux kernel's Rust implementation of Binder (a system for communication between processes) caused an out-of-bounds error when handling empty FDA objects (arrays of file descriptors with zero entries). The code incorrectly used a special value to mark certain operations, which conflicted with the valid case of an empty array, potentially allowing writes beyond the allocated memory buffer.
Solution / Mitigation
The bug was fixed by replacing the pattern of using `skip == 0` as a special marker value with a Rust enum instead. This change eliminates the ambiguity between a special marker value and the legitimate case of an empty FDA with zero-length skip.
Vulnerability Details
EPSS: 0.0%
Classification
Original source: https://nvd.nist.gov/vuln/detail/CVE-2026-23194
First tracked: February 14, 2026 at 03:07 PM
Classified by LLM (prompt v3) · confidence: 95%