gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
{ "binaries": [ { "binary_name": "gpsd", "binary_version": "3.15-2build1" }, { "binary_name": "gpsd-clients", "binary_version": "3.15-2build1" }, { "binary_name": "libgps-dev", "binary_version": "3.15-2build1" }, { "binary_name": "libgps22", "binary_version": "3.15-2build1" }, { "binary_name": "libqgpsmm-dev", "binary_version": "3.15-2build1" }, { "binary_name": "libqgpsmm22", "binary_version": "3.15-2build1" }, { "binary_name": "python-gps", "binary_version": "3.15-2build1" } ] }
{ "binaries": [ { "binary_name": "gpsd", "binary_version": "3.17-5" }, { "binary_name": "gpsd-clients", "binary_version": "3.17-5" }, { "binary_name": "libgps-dev", "binary_version": "3.17-5" }, { "binary_name": "libgps23", "binary_version": "3.17-5" }, { "binary_name": "libqgpsmm-dev", "binary_version": "3.17-5" }, { "binary_name": "libqgpsmm23", "binary_version": "3.17-5" }, { "binary_name": "python-gps", "binary_version": "3.17-5" } ] }