CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched in version 1.4.3.
References
| Link | Resource |
|---|---|
| https://github.com/nasa/CryptoLib/commit/2372efd3da1ccb226b4297222e25f41ecc84821d | Patch |
| https://github.com/nasa/CryptoLib/releases/tag/v1.4.3 | Release Notes |
| https://github.com/nasa/CryptoLib/security/advisories/GHSA-3m35-m689-h29x | Exploit Vendor Advisory |
| https://github.com/nasa/CryptoLib/security/advisories/GHSA-3m35-m689-h29x | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-10 01:16
Updated : 2026-01-15 21:45
NVD link : CVE-2026-22027
Mitre link : CVE-2026-22027
CVE.ORG link : CVE-2026-22027
JSON object : View
Products Affected
nasa
- cryptolib
CWE
CWE-122
Heap-based Buffer Overflow
