CVE-2025-67269

Publication date 2 January 2026

Last updated 8 January 2026


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Description

An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

Read the notes from the security team

Status

Package Ubuntu Release Status
gpsd 25.10 questing
Fixed 3.25-5ubuntu1.25.10.1
25.04 plucky
Fixed 3.25-5ubuntu1.25.04.1
24.04 LTS noble
Fixed 3.25-3ubuntu3.2
22.04 LTS jammy
Fixed 3.22-4ubuntu2.1
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Notes


mdeslaur

fix is in 3.27.1, not 3.27-1.1

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gpsd

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

Other references