Noticed this in my code review: https://petertodd.org/2016/segwit-consensus-critical-code-review#peer-to-peer-networking
Basically it looks like an attacker may be able to send nodes transactions with malleated witness data, which we don’t consistently mark as possibly corrupted in AcceptToMemoryPool(). Result would be those txids being added to recentRejects, messing up propagation.
That said, I haven’t actually tested this yet; about to go off to a conference, so if someone else wants to confirm for me that’d be much appreciated! Or if I’m wrong you’re welcome to all laugh at my expense. :)