icon

We found results for “

CVE-2025-67269

Good to know:

icon

Date: January 1, 2026

An integer underflow vulnerability exists in the "nextstate()" function in "gpsd/packet.c" of gpsd versions prior to commit "ffa1d6f40bca0b035fc7f5e563160ebb67199da7". When parsing a NAVCOM packet, the payload length is calculated using "lexer->length = (size_t)c - 4" without checking if the input byte "c" is less than 4. This results in an unsigned integer underflow, setting "lexer->length" to a very large value (near "SIZE_MAX"). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

Severity Score

Severity Score

Weakness Type (CWE)

Integer Underflow (Wrap or Wraparound)

CWE-191

Top Fix

icon

Upgrade Version

Upgrade to version https://gitlab.com/gpsd/gpsd.git - release-3.27.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us