GHSA-2fjw-whxm-9v4q
A heap-buffer-overflow vulnerability exists in the Rust wrapper for libnftnl, triggered via the nftnl::Batch::withpagesize constructor. When a small or malformed page size is provided, the underlying C code allocates an insufficient buffer, leading to out-of-bounds writes during batch initialization.
The flaw was fixed in commit 94a286f by adding an overflow check:
batch_page_size
.checked_add(crate::nft_nlmsg_maxsize())
.expect("batch_page_size is too large and would overflow");Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/mullvad/nftnl-rs/issues/76#issue-3528876468, https://github.com/mullvad/nftnl-rs/commit/94a286f87e88f431913d19668246de9006790125, https://github.com/mullvad/nftnl-rs, https://rustsec.org/advisories/RUSTSEC-2025-0126.html
