mnl has segmentation fault and invalid memory read in `mnl::cb_run`
Low severity
GitHub Reviewed
Published
Jan 9, 2026
to the GitHub Advisory Database
•
Updated Jan 9, 2026
Description
Published to the GitHub Advisory Database
Jan 9, 2026
Reviewed
Jan 9, 2026
Last updated
Jan 9, 2026
The function
mnl::cb_runis marked as safe but exhibits unsound behavior when processing malformed Netlink message buffers.Passing a crafted byte slice to
mnl::cb_runcan trigger memory violations. The function does not sufficiently validate the input buffer structure before processing, leading to out-of-bounds reads.This vulnerability allows an attacker to cause a Denial of Service (segmentation fault) or potentially read unmapped memory by providing a malformed Netlink message.
References