|
|
Log in / Subscribe / Register

Mageia alert MGASA-2026-0028 (gpsd)

From:  Mageia Updates <updates-announce@ml.mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2026-0028: Updated gpsd packages fix security vulnerabilities
Date:  Fri, 30 Jan 2026 01:40:16 +0100
Message-ID:  <20260130004016.EBD00A0DE2@duvel.mageia.org>
Archive-link:  Article

MGASA-2026-0028 - Updated gpsd packages fix security vulnerabilities Publication date: 30 Jan 2026 URL: https://advisories.mageia.org/MGASA-2026-0028.html Type: security Affected Mageia releases: 9 CVE: CVE-2025-67268, CVE-2025-67269 Description: gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution. (CVE-2025-67268) An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition. (CVE-2025-67269) References: - https://bugs.mageia.org/show_bug.cgi?id=34959 - https://ubuntu.com/security/notices/USN-7948-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6... SRPMS: - 9/core/gpsd-3.25-1.1.mga9


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds