Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-0770

Опубликовано: 19 янв. 2026
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2026-0770: gpsd security update (IMPORTANT)

[1:3.26.1-1.0.1.el10_1.1]

  • Replace upstream reference [Orabug: 37033219]

[1:3.26.1-1.el10_1.1]

  • fix buffer overflow in NMEA2000 driver (CVE-2025-67268)
  • fix integer underflow in handling of Navcom packets (CVE-2025-67269)

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

gpsd

3.26.1-1.0.1.el10_1.1

gpsd-clients

3.26.1-1.0.1.el10_1.1

python3-gpsd

3.26.1-1.0.1.el10_1.1

Oracle Linux x86_64

gpsd

3.26.1-1.0.1.el10_1.1

gpsd-clients

3.26.1-1.0.1.el10_1.1

python3-gpsd

3.26.1-1.0.1.el10_1.1

Связанные CVE

Связанные уязвимости

rocky
20 дней назад

Important: gpsd-minimal security update

rocky
19 дней назад

Important: gpsd security update

oracle-oval
21 день назад

ELSA-2026-0771: gpsd-minimal security update (IMPORTANT)

CVSS3: 7.5
ubuntu
около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
nvd
около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.