gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
{
"binaries": [
{
"binary_name": "gpsd",
"binary_version": "3.15-2build1"
},
{
"binary_name": "gpsd-clients",
"binary_version": "3.15-2build1"
},
{
"binary_name": "libgps-dev",
"binary_version": "3.15-2build1"
},
{
"binary_name": "libgps22",
"binary_version": "3.15-2build1"
},
{
"binary_name": "libqgpsmm-dev",
"binary_version": "3.15-2build1"
},
{
"binary_name": "libqgpsmm22",
"binary_version": "3.15-2build1"
},
{
"binary_name": "python-gps",
"binary_version": "3.15-2build1"
}
]
}
{
"binaries": [
{
"binary_name": "gpsd",
"binary_version": "3.17-5"
},
{
"binary_name": "gpsd-clients",
"binary_version": "3.17-5"
},
{
"binary_name": "libgps-dev",
"binary_version": "3.17-5"
},
{
"binary_name": "libgps23",
"binary_version": "3.17-5"
},
{
"binary_name": "libqgpsmm-dev",
"binary_version": "3.17-5"
},
{
"binary_name": "libqgpsmm23",
"binary_version": "3.17-5"
},
{
"binary_name": "python-gps",
"binary_version": "3.17-5"
}
]
}