The NMEA0183 driver in gpsd before 3.9 allows remote attackers to cause a denial of service (daemon termination) and possibly execute arbitrary code via a GPS packet with a malformed $GPGGA interpreted sentence that lacks certain fields and a terminator. NOTE: a separate issue in the AIS driver was also reported, but it might not be a vulnerability.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gpsd",
"binary_version": "3.9-3"
},
{
"binary_name": "gpsd-clients",
"binary_version": "3.9-3"
},
{
"binary_name": "gpsd-dbg",
"binary_version": "3.9-3"
},
{
"binary_name": "libgps-dev",
"binary_version": "3.9-3"
},
{
"binary_name": "libgps20",
"binary_version": "3.9-3"
},
{
"binary_name": "libqgpsmm-dev",
"binary_version": "3.9-3"
},
{
"binary_name": "libqgpsmm20",
"binary_version": "3.9-3"
},
{
"binary_name": "python-gps",
"binary_version": "3.9-3"
}
]
}