<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-46673 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-46673/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 20:50:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-46673/feed.xml" rel="self" type="application/rss+xml"/><item><title>Russh CryptoVec Unchecked Allocation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-russh-cryptovec-vuln/</link><pubDate>Thu, 21 May 2026 20:50:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-russh-cryptovec-vuln/</guid><description>Russh versions up to 0.60.2 are vulnerable to a memory-safety hardening issue due to unchecked `CryptoVec` allocation and growth handling, reachable from local agent inputs and remote SSH traffic, potentially triggering a process abort under constrained memory conditions.</description><content:encoded><![CDATA[<p>Russh versions up to 0.60.2 contain a vulnerability related to unchecked memory allocation within the <code>CryptoVec</code> component. This flaw stems from insufficient validation of peer-supplied lengths when resizing buffers, leading to potential unchecked capacity growth, length arithmetic, and unsafe allocation/locking paths. In current releases, local SSH agent peers can trigger this through crafted frame lengths. In older releases before version 0.58.0, remote SSH traffic could also exploit this via transport and compression buffers. Successful exploitation can lead to a process abort, especially under constrained memory conditions, impacting the availability of the SSH service. The vulnerability is identified as CVE-2026-46673.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker connects to an SSH server running a vulnerable version of Russh (&lt;= 0.60.2).</li>
<li>If the Russh version is before 0.58.0, the attacker sends a crafted SSH packet with a large, compressed payload.</li>
<li>The server attempts to decompress the payload, leading to the allocation of a <code>CryptoVec</code> buffer for the decompressed data.</li>
<li>Due to the unchecked growth, the <code>CryptoVec</code> attempts to allocate an excessively large buffer, potentially exceeding available memory.</li>
<li>Under constrained memory conditions, the allocation fails, resulting in a null pointer being passed to <code>NonNull::new_unchecked()</code>.</li>
<li>This triggers a panic and aborts the process.</li>
<li>Alternatively, if the attacker has local access to an SSH agent client or server, they can send oversized agent frame lengths.</li>
<li>The agent client or server attempts to resize its internal buffer based on the attacker-controlled length, triggering the same unchecked allocation issues described above, leading to a process abort.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability can lead to a denial-of-service condition. While the provided information doesn&rsquo;t demonstrate practical code execution or data breaches, the vulnerability allows an attacker to trigger a process abort, especially under constrained memory. This can disrupt SSH services and potentially impact systems relying on SSH for management or communication. This affects <code>russh-cryptovec</code> and <code>russh</code> packages with versions up to 0.60.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Russh version 0.60.3 or later to patch CVE-2026-46673.</li>
<li>Monitor process crashes related to <code>russh</code> or <code>russh-cryptovec</code>, especially in constrained memory environments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Russh CryptoVec Memory Allocation Failure&rdquo; to identify potential exploitation attempts based on error messages in logs.</li>
<li>Consider implementing resource limits for SSH processes to mitigate the impact of potential memory exhaustion attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory-allocation</category><category>denial-of-service</category><category>ssh</category><category>CVE-2026-46673</category></item></channel></rss>