<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Memory Leak — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/memory-leak/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 07:33:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/memory-leak/feed.xml" rel="self" type="application/rss+xml"/><item><title>rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</link><pubDate>Wed, 29 Apr 2026 07:33:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</guid><description>CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.</description><content:encoded><![CDATA[<p>CVE-2026-41898 is a security vulnerability affecting the rust-openssl library. The vulnerability stems from a failure to properly validate the length of data returned by callbacks during Pre-Shared Key (PSK) and cookie generation processes within OpenSSL. This oversight can lead to OpenSSL inadvertently exposing adjacent memory regions to a remote network peer. While the exact scope of impact is not detailed in the initial advisory, the potential for memory leakage raises concerns about sensitive information disclosure. Defenders should closely monitor applications utilizing rust-openssl for anomalous behavior indicative of exploitation attempts. The Microsoft Security Response Center published information regarding this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A client initiates a TLS handshake with a server using rust-openssl.</li>
<li>The server requests PSK or initiates a cookie exchange as part of the TLS handshake.</li>
<li>rust-openssl triggers a callback function to generate the PSK or cookie data.</li>
<li>The callback function returns data with a length that is not properly validated by rust-openssl.</li>
<li>Due to the unchecked length, OpenSSL reads beyond the intended buffer boundary.</li>
<li>OpenSSL copies the over-read memory region into the response sent to the client.</li>
<li>The client receives the response containing the leaked memory.</li>
<li>The client can then analyze the leaked memory for sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41898 can lead to the leakage of sensitive information from the server&rsquo;s memory. This information could include cryptographic keys, session data, or other confidential data. The extent of the leak depends on the amount of memory that is read beyond the intended buffer. The vulnerability could affect any application or service that uses rust-openssl for TLS communication and relies on PSK or cookie generation. The number of potential victims is currently unknown, but it would depend on the adoption rate of rust-openssl in security-sensitive applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusually large TLS handshake responses, which may indicate an attempt to trigger the memory leak.</li>
<li>Implement robust input validation for callback functions used in PSK and cookie generation within rust-openssl.</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts based on anomalous network connection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rust-openssl</category><category>memory-leak</category><category>tls</category><category>cve</category></item><item><title>rust-openssl Unchecked Callback Length Memory Leak</title><link>https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-memory-leak/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-memory-leak/</guid><description>The rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.</description><content:encoded><![CDATA[<p>The <code>rust-openssl</code> crate, a Rust wrapper for the OpenSSL library, is susceptible to a high-severity vulnerability due to unchecked callback lengths within the FFI trampolines used by several functions related to PSK (Pre-Shared Key) and cookie generation. Specifically, versions 0.9.24 up to (but not including) 0.10.78 are affected. The vulnerable functions include <code>SslContextBuilder::set_psk_client_callback</code>, <code>set_psk_server_callback</code>, <code>set_cookie_generate_cb</code>, and <code>set_stateless_cookie_generate_cb</code>. The issue arises because the user-provided closure&rsquo;s returned <code>usize</code> (size) value is directly passed to OpenSSL without validation against the size of the <code>&amp;mut [u8]</code> buffer provided to the closure, resulting in potential buffer overflows and memory leaks. This allows an attacker to potentially leak adjacent memory regions to a peer.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious application or exploits an existing application using the vulnerable <code>rust-openssl</code> crate.</li>
<li>The attacker triggers one of the vulnerable callback functions (<code>set_psk_client_callback</code>, <code>set_psk_server_callback</code>, <code>set_cookie_generate_cb</code>, or <code>set_stateless_cookie_generate_cb</code>).</li>
<li>The vulnerable callback function executes the user-provided closure.</li>
<li>The user-provided closure returns a <code>usize</code> value indicating the intended length of the data to be written to the output buffer.</li>
<li>The FFI trampoline forwards this <code>usize</code> value directly to OpenSSL, bypassing bounds checking against the actual buffer size.</li>
<li>If the returned <code>usize</code> exceeds the allocated buffer size, OpenSSL writes beyond the buffer boundary, leading to a buffer overflow.</li>
<li>The buffer overflow allows the attacker to read adjacent memory regions or overwrite data, potentially leaking sensitive information or corrupting program state.</li>
<li>Successful exploitation could lead to information disclosure, denial of service, or potentially arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to information disclosure, denial of service, or potentially arbitrary code execution. Given the widespread use of the <code>rust-openssl</code> crate in various applications, the impact could be significant, affecting numerous services and potentially exposing sensitive data. The vulnerability allows for memory leakage to peers which could have broad consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>rust-openssl</code> version 0.10.78 or later to patch the vulnerability (reference: <a href="https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78)">https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78)</a>.</li>
<li>Implement input validation and sanitization within user-provided closures to ensure that the returned <code>usize</code> value does not exceed the allocated buffer size, mitigating the risk even in vulnerable versions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rust</category><category>openssl</category><category>memory leak</category><category>buffer overflow</category></item><item><title>Android-ImageMagick7 Memory Leak Vulnerability (CVE-2026-33852)</title><link>https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-memory-leak/</link><pubDate>Tue, 24 Mar 2026 07:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-memory-leak/</guid><description>A missing release of memory vulnerability (CVE-2026-33852) in MolotovCherry Android-ImageMagick7 before version 7.1.2-11 can lead to a denial-of-service condition due to memory exhaustion.</description><content:encoded><![CDATA[<p>CVE-2026-33852 is a &ldquo;Missing Release of Memory after Effective Lifetime&rdquo; vulnerability affecting MolotovCherry Android-ImageMagick7 versions prior to 7.1.2-11. Discovered by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG), this memory leak can occur when processing specially crafted image files. An attacker could potentially exploit this vulnerability to cause a denial-of-service condition on a vulnerable Android device by repeatedly triggering the memory leak…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>memory leak</category><category>denial of service</category><category>android</category></item></channel></rss>