A heap-buffer-overflow vulnerability exists in the Rust wrapper for libnftnl, triggered via the nftnl::Batch::withpagesize constructor. When a small or malformed page size is provided, the underlying C code allocates an insufficient buffer, leading to out-of-bounds writes during batch initialization.
The flaw was fixed in commit 94a286f by adding an overflow check:
batch_page_size
.checked_add(crate::nft_nlmsg_maxsize())
.expect("batch_page_size is too large and would overflow");
The fix has not been added to the Rust registry at the time of publish.
{
"nvd_published_at": null,
"github_reviewed": true,
"cwe_ids": [
"CWE-122"
],
"severity": "CRITICAL",
"github_reviewed_at": "2025-11-25T23:18:37Z"
}