gpsd-minimal-3.26.1-1.el9_7.1
エラータID: AXSA:2026-055:01
gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. The Cybertrust Japan Co., Ltd. support for this package is limited. See for more details.
Security Fix(es):
* gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269)
* gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-67268
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
CVE-2025-67269
An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
Update packages.
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
N/A
SRPMS
- gpsd-minimal-3.26.1-1.el9_7.1.src.rpm
MD5: 3a533e6d8dc9852ea00f30b5f9badde0
SHA-256: 0b28acaca5bb3d2fbfeb228a6ba1f575643a77eb22841210aa27a573408cb60a
Size: 11.11 MB
Asianux Server 9 for x86_64
- gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm
MD5: a0935430cf87aae52441038149e47b3f
SHA-256: 69b97680ea2ca08094d35f0f134036c750c320625f4acf9c3ff715f21c0569d5
Size: 617.28 kB - gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm
MD5: 575b78590d1cce925610bfd98cc2258a
SHA-256: 42e113449c6ab88a680f6afd4c93490a2e3da39cd464571344fcb1ffbde2789a
Size: 681.23 kB