Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 May 2013 05:58:48 -0400 (EDT)
From: Jan Lieskovsky <>
Cc: "Steven M. Christey" <>,
        "Eric S. Raymond" <>,
        Miroslav Lichvar <>
Subject: CVE Request -- gpsd 3.9 fixing a denial of service flaw

Hello Kurt, Steve, Eric, Miroslav, vendors,

  GPSD upstream has released 3.9 version:

correcting one denial of service problem [2]:
A denial of service flaw was found in the way AIS driver packet parser of
gpsd, a service daemon for mediating access to a GPS, processed certain
malformed packets. A remote attacker could provide a specially-crafted
device input that, when processed would lead to gpsd's packet parser
crash (gpsd daemon termination).


Candidate upstream patches [*]:

[*] Candidate because upstream #38511 is private currently: => hard to say
    if [3] is fixing this issue, or the DoS would be caused
    by the malformed packet crash / sample, as listed in [4].
@Eric - Eric, could you please help us to solve this doubt? (which
of the patches is the correct one to fix the above mentioned DoS
/ security issue)

Thanks: Goes to Miroslav Lichvar for bringing this one to my attention.

Kurt, could you allocate a CVE identifier for this?

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.