Fedora alert FEDORA-2026-2ca69451b9 (gpsd)
| From: | updates--- via package-announce <package-announce@lists.fedoraproject.org> | |
| To: | package-announce@lists.fedoraproject.org | |
| Subject: | [SECURITY] Fedora 43 Update: gpsd-3.26.1-6.fc43 | |
| Date: | Thu, 15 Jan 2026 01:13:43 +0000 | |
| Message-ID: | <20260115011343.0831E6643D@bastion01.rdu3.fedoraproject.org> | |
| Archive-link: | Article |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-2ca69451b9 2026-01-15 01:11:51.080180+00:00 -------------------------------------------------------------------------------- Name : gpsd Product : Fedora 43 Version : 3.26.1 Release : 6.fc43 URL : https://gpsd.gitlab.io/gpsd/index.html Summary : Service daemon for mediating access to a GPS Description : gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. With gpsd, multiple GPS client applications (such as navigational and war-driving software) can share access to a GPS without contention or loss of data. Also, gpsd responds to queries with a format that is substantially easier to parse than NMEA 0183. -------------------------------------------------------------------------------- Update Information: Security fixes for CVE-2025-67268 and CVE-2025-67269. -------------------------------------------------------------------------------- ChangeLog: * Mon Jan 12 2026 Miroslav Lichvar <mlichvar@redhat.com> - 1:3.26.1-6 - fix buffer overflow in NMEA2000 driver (CVE-2025-67268) - fix integer underflow in handling of Navcom packets (CVE-2025-67269) -------------------------------------------------------------------------------- References: [ 1 ] Bug #2426827 - CVE-2025-67269 gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2426827 [ 2 ] Bug #2426828 - CVE-2025-67269 gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2426828 [ 3 ] Bug #2426932 - CVE-2025-67268 gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2426932 [ 4 ] Bug #2426933 - CVE-2025-67268 gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2426933 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-2ca69451b9' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
