Логотип exploitDog
bind:"GHSA-xcj3-m9c5-2prq" OR bind:"CVE-2025-67269"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-xcj3-m9c5-2prq" OR bind:"CVE-2025-67269"

Количество 8

Количество 8

github логотип

GHSA-xcj3-m9c5-2prq

около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-67269

около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-67269

около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-67269

около 1 месяца назад

An integer underflow vulnerability exists in the `nextstate()` functio ...

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2026:0771

21 день назад

Important: gpsd-minimal security update

EPSS: Низкий
rocky логотип

RLSA-2026:0770

20 дней назад

Important: gpsd security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0771

22 дня назад

ELSA-2026-0771: gpsd-minimal security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-0770

22 дня назад

ELSA-2026-0770: gpsd security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xcj3-m9c5-2prq

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
ubuntu логотип
CVE-2025-67269

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-67269

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-67269

An integer underflow vulnerability exists in the `nextstate()` functio ...

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
rocky логотип
RLSA-2026:0771

Important: gpsd-minimal security update

21 день назад
rocky логотип
RLSA-2026:0770

Important: gpsd security update

20 дней назад
oracle-oval логотип
ELSA-2026-0771

ELSA-2026-0771: gpsd-minimal security update (IMPORTANT)

22 дня назад
oracle-oval логотип
ELSA-2026-0770

ELSA-2026-0770: gpsd security update (IMPORTANT)

22 дня назад

Уязвимостей на страницу