Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 15 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nasa:cryptolib:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nasa
Nasa cryptolib |
|
| Vendors & Products |
Nasa
Nasa cryptolib |
Sat, 10 Jan 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched in version 1.4.3. | |
| Title | CryptoLib Vulnerable to Heap Buffer Overflow in MariaDB SA Hexstring Conversion | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-12T16:23:53.099Z
Reserved: 2026-01-05T22:30:38.718Z
Link: CVE-2026-22027
Updated: 2026-01-12T15:33:56.868Z
Status : Analyzed
Published: 2026-01-10T01:16:18.990
Modified: 2026-01-15T21:45:02.797
Link: CVE-2026-22027
No data.
OpenCVE Enrichment
Updated: 2026-04-18T07:30:36Z