CVE-2024-25763

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25763
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25763.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-25763
Downstream
Published
2024-02-26T16:27:59Z
Modified
2025-09-16T07:35:12.134248Z
Summary
[none]
Details

openNDS 10.2.0 is vulnerable to Use-After-Free via /openNDS/src/auth.c.

References

Affected packages

Debian:12 / opennds

Package

Name
opennds
Purl
pkg:deb/debian/opennds?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.10.0-1

10.*

10.2.0+dfsg-1
10.3.0+dfsg-0.1
10.3.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / opennds

Package

Name
opennds
Purl
pkg:deb/debian/opennds?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.3.0+dfsg-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / opennds

Package

Name
opennds
Purl
pkg:deb/debian/opennds?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.3.0+dfsg-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/opennds/opennds

Affected ranges

Type
GIT
Repo
https://github.com/opennds/opennds
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v10.*

v10.1.0
v10.1.1
v10.1.2
v10.1.3
v10.2.0

v5.*

v5.0.0
v5.0.1
v5.1.0
v5.2.0

v6.*

v6.0.0

v7.*

v7.0.0
v7.0.1

v8.*

v8.0.0
v8.1.0
v8.1.1

v9.*

v9.0.0
v9.1.0
v9.1.1
v9.10.0
v9.2.0
v9.3.0
v9.4.0
v9.5.0
v9.5.1
v9.6.0
v9.7.0
v9.8.0
v9.9.0
v9.9.1