You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Segmentation fault and invalid memory read in `mnl::cb_run`
14
+
15
+
The function `mnl::cb_run` is marked as safe but exhibits unsound behavior when processing malformed Netlink message buffers.
16
+
17
+
Passing a crafted byte slice to `mnl::cb_run` can trigger memory violations. The function does not sufficiently validate the input buffer structure before processing, leading to out-of-bounds reads.
18
+
19
+
This vulnerability allows an attacker to cause a Denial of Service (segmentation fault) or potentially read unmapped memory by providing a malformed Netlink message.
0 commit comments