CVE-2026-22024

Source
https://cve.org/CVERecord?id=CVE-2026-22024
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22024.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22024
Aliases
  • GHSA-r3wg-g8xv-gxvf
Published
2026-01-10T00:19:16.006Z
Modified
2026-03-14T12:47:09.199623Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
CryptoLib Memory Leak in KMC Encrypt Function Leads to Resource Exhaustion
Details

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-401"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22024.json"
}
References

Affected packages

Git / github.com/nasa/cryptolib

Affected ranges

Type
GIT
Repo
https://github.com/nasa/cryptolib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1-engineering-release
v1.*
v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1
v1.4.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22024.json"