Skip to main content
Disclosures

NASA · CryptoLib

Memory Leak on HTTP Error Response in KMC Client

6.3medium
SecMateSECMATE-2025-0005
VendorNASA
ProductCryptoLib
VectorCVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Timeline
Reported
Nov 29, 2025
Fixed
Jan 6, 2026
Published
Jan 9, 2026
Summary

When the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory.

What's hidden in yours?

Find out