The function mnl::cb_run is marked as safe but exhibits unsound behavior when processing malformed Netlink message buffers.
Passing a crafted byte slice to mnl::cb_run can trigger memory violations. The function does not sufficiently validate the input buffer structure before processing, leading to out-of-bounds reads.
This vulnerability allows an attacker to cause a Denial of Service (segmentation fault) or potentially read unmapped memory by providing a malformed Netlink message.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-125"
],
"severity": "LOW",
"github_reviewed_at": "2026-01-09T19:53:23Z",
"nvd_published_at": null
}