CVE Vulnerabilities

CVE-2025-67269

Integer Underflow (Wrap or Wraparound)

Published: Jan 02, 2026 | Modified: Jan 09, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An integer underflow vulnerability exists in the nextstate() function in gpsd/packet.c of gpsd versions prior to commit ffa1d6f40bca0b035fc7f5e563160ebb67199da7. When parsing a NAVCOM packet, the payload length is calculated using lexer->length = (size_t)c - 4 without checking if the input byte c is less than 4. This results in an unsigned integer underflow, setting lexer->length to a very large value (near SIZE_MAX). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

Weakness

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

Affected Software

NameVendorStart VersionEnd Version
GpsdGpsd_project*3.27.1 (excluding)
Red Hat Enterprise Linux 10RedHatgpsd-1:3.26.1-1.el10_1.1*
Red Hat Enterprise Linux 9RedHatgpsd-minimal-1:3.26.1-1.el9_7.1*
GpsdUbuntudevel*
GpsdUbuntujammy*
GpsdUbuntunoble*
GpsdUbuntuplucky*
GpsdUbuntuquesting*
GpsdUbuntuupstream*

References