An integer overflow vulnerability exists in the NTRIP Stream Parsing functionality of GPSd 3.25.1~dev. A specially crafted network packet can lead to memory corruption. An attacker can send a malicious packet to trigger this vulnerability. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1860
Created gpsd tracking bugs for this issue: Affects: epel-all [bug 2252974] Affects: fedora-all [bug 2252973]
It seems this issue isn't present in any gpsd release, just the development code. I can reproduce it after commit c1c1c2706c4f5b9bf3be437d0a8f0106ef00c5e7 and it's fixed in commit 3e5c6c28c422102dd453e31912e1e79d1f7ff7f2.