Skip to content

Conversation

@cuiwenhao123
Copy link
Contributor

Segmentation fault and invalid memory read in mnl::cb_run

The function mnl::cb_run is marked as safe but exhibits unsound behavior when processing malformed Netlink message buffers.

Passing a crafted byte slice to mnl::cb_run can trigger memory violations. The function does not sufficiently validate the input buffer structure before processing, leading to out-of-bounds reads.

This vulnerability allows an attacker to cause a Denial of Service (segmentation fault) or potentially read unmapped memory by providing a malformed Netlink message.

@djc djc changed the title add-rustsec-for-mnl Segfaul and invalid memory read in mnl Jan 5, 2026
@djc djc changed the title Segfaul and invalid memory read in mnl Segfault and invalid memory read in mnl Jan 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant