CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.
References
| Link | Resource |
|---|---|
| https://github.com/nasa/CryptoLib/commit/2372efd3da1ccb226b4297222e25f41ecc84821d | Patch |
| https://github.com/nasa/CryptoLib/releases/tag/v1.4.3 | Release Notes |
| https://github.com/nasa/CryptoLib/security/advisories/GHSA-h74x-vwwr-mm5g | Exploit Vendor Advisory |
| https://github.com/nasa/CryptoLib/security/advisories/GHSA-h74x-vwwr-mm5g | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-10 01:16
Updated : 2026-01-16 16:39
NVD link : CVE-2026-22025
Mitre link : CVE-2026-22025
CVE.ORG link : CVE-2026-22025
JSON object : View
Products Affected
nasa
- cryptolib
