gpsd-minimal-3.26.1-1.el9_7.1
エラータID: AXSA:2026-055:01
リリース日:
2026/01/21 Wednesday - 12:19
題名:
gpsd-minimal-3.26.1-1.el9_7.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- gpsd の hnd_129540() 関数には、ヒープベースのバッファオーバー
フローの問題があるため、リモートの攻撃者により、サービス拒否攻撃
を可能とする脆弱性が存在します。(CVE-2025-67268)
- gpsd の nextstate() 関数には、整数アンダーフローの問題がある
ため、リモートの攻撃者により、サービス拒否攻撃を可能とする脆弱性
が存在します。(CVE-2025-67269)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-67268
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
CVE-2025-67269
An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
追加情報:
N/A
ダウンロード:
SRPMS
- gpsd-minimal-3.26.1-1.el9_7.1.src.rpm
MD5: 3a533e6d8dc9852ea00f30b5f9badde0
SHA-256: 0b28acaca5bb3d2fbfeb228a6ba1f575643a77eb22841210aa27a573408cb60a
Size: 11.11 MB
Asianux Server 9 for x86_64
- gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm
MD5: a0935430cf87aae52441038149e47b3f
SHA-256: 69b97680ea2ca08094d35f0f134036c750c320625f4acf9c3ff715f21c0569d5
Size: 617.28 kB - gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm
MD5: 575b78590d1cce925610bfd98cc2258a
SHA-256: 42e113449c6ab88a680f6afd4c93490a2e3da39cd464571344fcb1ffbde2789a
Size: 681.23 kB