Source: gpsd
Version: 3.17-5
Severity: grave
Tags: security upstream
Control: found -1 3.16-4
Control: fixed -1 3.18.1-1

Hi,

The following vulnerability was published for gpsd, not competely sure
on severity and on if the referenced upstream commit is enough.
Ideally though the fix seems ideal to go to buster.

CVE-2018-17937[0]:
| gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open
| source project, allow a stack-based buffer overflow, which may allow
| remote attackers to execute arbitrary code on embedded platforms via
| traffic on Port 2947/TCP or crafted JSON inputs.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-17937
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17937

Regards,
Salvatore

Reply via email to