Debian Package Tracker
Register | Log in
Subscribe

gpsd

Global Positioning System - daemon

Choose email to subscribe with

general
  • source: gpsd (main)
  • version: 3.27-1.1
  • maintainer: Boian Bonev (DMD) (DM)
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.22-4
  • oldstable: 3.22-4.1
  • stable: 3.25-5
  • testing: 3.27-1.1
  • unstable: 3.27-1.1
versioned links
  • 3.22-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.22-4.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.25-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.27-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gpsd (15 bugs: 0, 11, 4, 0)
  • gpsd-clients (4 bugs: 0, 3, 1, 0)
  • gpsd-tools (2 bugs: 0, 2, 0, 0)
  • libgps-dev
  • libgps32
  • libqgpsmm-dev
  • libqgpsmm32
  • python3-gps (2 bugs: 0, 2, 0, 0)
action needed
A new upstream version is available: 3.27.5 high
A new upstream version 3.27.5 is available, you should consider packaging it.
Created: 2025-12-21 Last update: 2026-01-18 13:30
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2025-67268: gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
  • CVE-2025-67269: An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
Created: 2026-01-06 Last update: 2026-01-07 01:32
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-67268: gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
  • CVE-2025-67269: An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
Created: 2026-01-06 Last update: 2026-01-07 01:32
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2025-67268: gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
  • CVE-2025-67269: An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
Created: 2026-01-03 Last update: 2026-01-07 01:32
debian/patches: 1 patch with invalid metadata, 5 patches to forward upstream high

Among the 6 debian patches available in version 3.27-1.1 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 5 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-11-27 20:00
AppStream hints: 2 errors and 2 warnings high
AppStream found metadata issues for packages:
  • gpsd-clients: 2 errors and 2 warnings
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2022-01-21 06:05
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 3.27.5-0.1, distribution unstable) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 63115c01176f7e22aa74041d30bb20b4c72aa575
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 17:57:13 2026 +0100

    White space fix

commit 9cc9988793cd5f5574ad0235152f06f0ebf3efd1
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 17:24:28 2026 +0100

    Refresh patches

commit fd9534ac04db71c59cecc6cc11475b0e3a04ecd8
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 17:22:20 2026 +0100

    Remove homemade gitlab rules
    
    could be replace by upstream salsaci
    git push -o ci.variable="SALSA_CI_DISABLE_BUILD_REVERSE_DEPENDENCIES=0" origin master

commit d149a56b8258afa824ac4e2106e685d71c65e98d
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 16:47:19 2026 +0100

    Finalize NMU

commit 7e6a14b89441e70a957eac03c38ad5973e73cc38
Merge: 43c3fab0a 379fb8194
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 16:43:24 2026 +0100

    Update upstream source from tag 'upstream/3.27.5'
    
    Update to upstream version '3.27.5'
    with Debian dir 88bce3d64b6474b0e8975e48b232398d7d17a871

commit 379fb81945dcc31b98044a9a449c5d728a166753
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Jan 17 16:43:20 2026 +0100

    New upstream version 3.27.5
Created: 2022-04-10 Last update: 2026-01-18 13:02
Depends on packages which need a new maintainer normal
The packages that gpsd depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2026-01-18 13:02
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-67268: (needs triaging) gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
  • CVE-2025-67269: (needs triaging) An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-03 Last update: 2026-01-07 01:32
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2025-67268: (needs triaging) gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
  • CVE-2025-67269: (needs triaging) An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-03 Last update: 2026-01-07 01:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-11-29] gpsd 3.27-1.1 MIGRATED to testing (Debian testing watch)
  • [2025-11-27] Accepted gpsd 3.27-1.1 (source) into unstable (Bastian Germann) (signed by: bage@debian.org)
  • [2025-11-26] Accepted gpsd 3.27-1 (source amd64) into experimental (Debian FTP Masters) (signed by: bage@debian.org)
  • [2025-11-19] gpsd 3.26.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-16] Accepted gpsd 3.26.1-1 (source amd64) into unstable (Debian FTP Masters) (signed by: Alexandre Detiste)
  • [2025-01-22] gpsd 3.25-5 MIGRATED to testing (Debian testing watch)
  • [2025-01-19] Accepted gpsd 3.25-5 (source) into unstable (Boian Bonev)
  • [2024-05-26] gpsd 3.25-4 MIGRATED to testing (Debian testing watch)
  • [2024-05-23] Accepted gpsd 3.25-4 (source) into unstable (Boian Bonev)
  • [2024-05-03] gpsd 3.25-3 MIGRATED to testing (Debian testing watch)
  • [2024-02-29] Accepted gpsd 3.25-3 (source) into unstable (Boian Bonev)
  • [2024-02-11] Accepted gpsd 3.25-3~exp1 (source) into experimental (Boian Bonev)
  • [2024-02-06] Accepted gpsd 3.25-2.1~exp1 (source) into experimental (Steve Langasek)
  • [2023-09-14] gpsd 3.25-2 MIGRATED to testing (Debian testing watch)
  • [2023-09-11] Accepted gpsd 3.25-2 (source) into unstable (Boian Bonev)
  • [2023-07-01] gpsd 3.25-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-28] Accepted gpsd 3.25-1 (source) into unstable (Boian Bonev)
  • [2023-06-26] Accepted gpsd 3.25-1~exp2 (source) into experimental (Boian Bonev) (signed by: bage@debian.org)
  • [2023-06-13] Accepted gpsd 3.25-1~exp1 (source amd64) into experimental (Debian FTP Masters) (signed by: bage@debian.org)
  • [2022-09-14] gpsd 3.22-4.1 MIGRATED to testing (Debian testing watch)
  • [2022-09-11] Accepted gpsd 3.22-4.1 (source) into unstable (Paul Gevers)
  • [2021-10-28] Accepted gpsd 3.16-4+deb9u1 (source) into oldoldstable (Adrian Bunk)
  • [2021-08-16] Accepted gpsd 3.22-4~bpo10+1 (source amd64) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Bernd Zeimetz)
  • [2021-08-04] gpsd 3.22-4 MIGRATED to testing (Debian testing watch)
  • [2021-08-01] Accepted gpsd 3.22-4 (source) into unstable (Bernd Zeimetz)
  • [2021-04-30] gpsd 3.22-3 MIGRATED to testing (Debian testing watch)
  • [2021-04-25] Accepted gpsd 3.22-3 (source) into unstable (Bernd Zeimetz)
  • [2021-01-16] gpsd 3.22-2 MIGRATED to testing (Debian testing watch)
  • [2021-01-13] Accepted gpsd 3.22-2 (source) into unstable (Bernd Zeimetz)
  • [2021-01-12] gpsd 3.22-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 31 32
  • RC: 2
  • I&N: 23 24
  • M&W: 6
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.27-1.1ubuntu1
  • 2 bugs
  • patches for 3.27-1.1ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing