Severity: Unknown
Affected Package: kernel
Summary: Local DoS and possible privilege escalation via routing sockets
The bug allows an unprivileged user to crash the kernel by triggering a stack buffer overflow in rtsock_msg_buffer(). In particular, the overflow will corrupt a stack canary value that is verified when the function returns; this mitigates the impact of the stack overflow by triggering a kernel panic. Other kernel bugs may exist that allow userspace to find the canary value and thus defeating the mitigation, at which point local privilege escalation may be possible.
No specific recommendations provided.
Aliases: CVE-2026-3038
Published: March 16, 2026
Last Modified: March 16, 2026