CVE-2025-26265

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-26265
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-26265.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-26265
Published
2025-03-27T16:15:30Z
Modified
2025-04-12T03:14:09.899772Z
Summary
[none]
Details

A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response.

References

Affected packages

Git / gitlab.eurecom.fr/oai/openairinterface5g

Affected ranges

Type
GIT
Repo
https://gitlab.eurecom.fr/oai/openairinterface5g
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
c599e172f1f6fd118610bc12aa5aa0f09b315b07

Affected versions

2016.*

2016.w49
2016.w50

2017.*

2017.w01
2017.w02
2017.w03
2017.w04
2017.w05
2017.w06
2017.w07
2017.w08
2017.w09
2017.w10
2017.w11
2017.w12
2017.w13
2017.w14
2017.w15
2017.w19
2017.w20
2017.w22
2017.w24
2017.w25
2017.w30
2017.w34
2017.w42
2017.w43
2017.w46
2017.w48

2018.*

2018.w02
2018.w03
2018.w04
2018.w05
2018.w06
2018.w07
2018.w08
2018.w09
2018.w10
2018.w11
2018.w12
2018.w15
2018.w19
2018.w25
2018.w29
2018.w31
2018.w33
2018.w36
2018.w39
2018.w40
2018.w41
2018.w44
2018.w46
2018.w47
2018.w48
2018.w51

2019.*

2019.w03
2019.w04
2019.w06
2019.w07
2019.w08
2019.w09
2019.w10
2019.w11
2019.w13
2019.w15
2019.w17
2019.w21
2019.w23
2019.w25
2019.w27
2019.w28
2019.w30
2019.w36
2019.w41
2019.w44
2019.w51

2020.*

2020.w03
2020.w04
2020.w05
2020.w06
2020.w09
2020.w11
2020.w15
2020.w16
2020.w17
2020.w19
2020.w22
2020.w23
2020.w24
2020.w25
2020.w26
2020.w28
2020.w29
2020.w30
2020.w31
2020.w33
2020.w34
2020.w36
2020.w37
2020.w38
2020.w39
2020.w41
2020.w42
2020.w42_2
2020.w44
2020.w45
2020.w45_2
2020.w46
2020.w46_2
2020.w47
2020.w48
2020.w48_2
2020.w49
2020.w50
2020.w51
2020.w51_2

2021.*

2021.w02
2021.w04
2021.w05
2021.w06
2021.w08
2021.w09
2021.w10
2021.w11
2021.w12
2021.w13_a
2021.w14
2021.w15
2021.w16
2021.w17_b
2021.w18_a
2021.w18_b
2021.w19
2021.w20
2021.w22
2021.w23
2021.w24
2021.w25
2021.w26
2021.w27
2021.w28
2021.w29
2021.w30
2021.w31
2021.w32
2021.w33
2021.w34
2021.w35
2021.w36
2021.w37
2021.w42
2021.w43
2021.w44
2021.w45
2021.w45_b
2021.w46
2021.w47
2021.w48
2021.w49_a
2021.w49_b
2021.w50_a
2021.w51_a
2021.w51_c
2021.wk13_c
2021.wk13_d
2021.wk14_a

2022.*

2022.41
2022.42
2022.w01
2022.w02
2022.w03_b
2022.w03_hotfix
2022.w05
2022.w05b
2022.w06
2022.w06a
2022.w07
2022.w07b
2022.w08
2022.w08b
2022.w09
2022.w09b
2022.w10
2022.w12
2022.w13
2022.w13a
2022.w13b
2022.w14a
2022.w15
2022.w15b
2022.w17
2022.w18
2022.w19
2022.w20
2022.w21
2022.w22
2022.w23
2022.w24
2022.w24b
2022.w25
2022.w26
2022.w29
2022.w30
2022.w31
2022.w31b
2022.w32
2022.w33
2022.w35
2022.w36
2022.w37
2022.w37b
2022.w38
2022.w39
2022.w40
2022.w41
2022.w42
2022.w42b
2022.w43
2022.w45
2022.w46
2022.w47
2022.w48
2022.w49
2022.w50
2022.w51

2023.*

2023.w02
2023.w03
2023.w05
2023.w06
2023.w07
2023.w08
2023.w08b
2023.w09
2023.w10
2023.w10b
2023.w11
2023.w11b
2023.w12
2023.w13
2023.w14
2023.w15
2023.w16
2023.w18
2023.w18b
2023.w19
2023.w20
2023.w21
2023.w22
2023.w23
2023.w24
2023.w25
2023.w26
2023.w27
2023.w28
2023.w29
2023.w30
2023.w31
2023.w32
2023.w33
2023.w34
2023.w36
2023.w37
2023.w38
2023.w39
2023.w40
2023.w41
2023.w42
2023.w43
2023.w45
2023.w47
2023.w48
2023.w49
2023.w50
2023.w51

2024.*

2024.w01
2024.w02
2024.w03
2024.w04
2024.w05
2024.w06

benetel_enb_rel_1.*

benetel_enb_rel_1.0

benetel_enb_rel_2.*

benetel_enb_rel_2.0

benetel_gnb_rel_2.*

benetel_gnb_rel_2.0

Other

benetel_phase_rotation
develop-nr-2019w23
develop-nr-2019w28
develop-nr-2019w40
develop-nr-2019w42
develop-nr-2019w43
develop-nr-2019w45
develop-nr-2019w47
develop-nr-2019w48
develop-nr-2019w50
develop-nr-2019w51
develop-nr-2020w02
develop-nr-pdcch
flexran-eol
nr-ip-over-lte
oai_nr_sync

nr-ip-over-lte-v.*

nr-ip-over-lte-v.1.0
nr-ip-over-lte-v.1.1
nr-ip-over-lte-v.1.2

v0.*

v0.1
v0.2
v0.3
v0.4
v0.5
v0.5.1_tdd
v0.5.2
v0.6
v0.6.1
v0.6.1_tdd

v1.*

v1.0.0
v1.0.1

v1B0.*

v1B0.1
v1B0.2
v1B0.3
v1B0.4
v1B0.5
v1B0.6
v1B0.7
v1B0.8

v2.*

v2.0.0
v2.1.0