Out-of-bounds Read Affecting mnl package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-MNL-14912633
  • published11 Jan 2026
  • disclosed9 Jan 2026
  • creditCui Wenhao

Introduced: 9 Jan 2026

New CVE NOT AVAILABLE CWE-125  (opens in a new tab)

How to fix?

There is no fixed version for mnl.

Overview

mnl is a Safe abstraction for libmnl, a minimalistic user-space library oriented to Netlink developers.

Affected versions of this package are vulnerable to Out-of-bounds Read via the mnl::cb_run function. An attacker can cause a segmentation fault or read unmapped memory by passing a crafted byte slice that triggers out-of-bounds memory access.

CVSS Base Scores

version 4.0
version 3.1