COMMAND
gpm
SYSTEMS AFFECTED
Linux
PROBLEM
There are security problems within gpm (General Purpose Mouse
support daemon) which allow removal of system files and also
exhibit a local denial of service attack.
SOLUTION
Caldera recommends users to upgrade to the new packages:
- OpenLinux Desktop 2.3: ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
RPMS/gpm-1.17.8-5.i386.rpm
RPMS/gpm-devel-1.17.8-5.i386.rpm
RPMS/gpm-devel-static-1.17.8-5.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
SRPMS/gpm-1.17.8-5.src.rpm
- OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
RPMS/gpm-1.17.8-5.i386.rpm
RPMS/gpm-devel-1.17.8-5.i386.rpm
RPMS/gpm-devel-static-1.17.8-5.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
SRPMS/gpm-1.17.8-5.src.rpm
- OpenLinux eDesktop 2.4 ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
RPMS/gpm-1.19.2-4.i386.rpm
RPMS/gpm-devel-1.19.2-4.i386.rpm
RPMS/gpm-devel-static-1.19.2-4.i386.rpm
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
SRPMS/gpm-1.19.2-4.src.rpm
For Conectiva Linux:
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.1/i386/gpm-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.1/i386/gpm-devel-1.19.3-1cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.1/i386/pam-0.72-15cl.i386.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0/SRPMS/pam-0.72-15cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.0es/SRPMS/pam-0.72-15cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.1/SRPMS/pam-0.72-15cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/4.2/SRPMS/pam-0.72-15cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.0/SRPMS/pam-0.72-15cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.1/SRPMS/gpm-1.19.3-1cl.src.rpm
ftp://ftp.conectiva.com.br/pub/conectiva/atualizacoes/5.1/SRPMS/pam-0.72-15cl.src.rpm
For Linux-Mandrake:
6.0/RPMS/gpm-1.19.2-4mdk.i586.rpm
6.0/RPMS/gpm-devel-1.19.2-4mdk.i586.rpm
6.0/SRPMS/gpm-1.19.2-4mdk.src.rpm
6.1/RPMS/gpm-1.19.2-4mdk.i586.rpm
6.1/RPMS/gpm-devel-1.19.2-4mdk.i586.rpm
6.1/SRPMS/gpm-1.19.2-4mdk.src.rpm
7.0/RPMS/gpm-1.19.2-4mdk.i586.rpm
7.0/RPMS/gpm-devel-1.19.2-4mdk.i586.rpm
7.0/SRPMS/gpm-1.19.2-4mdk.src.rpm
7.1/RPMS/gpm-1.19.2-4mdk.i586.rpm
7.1/RPMS/gpm-devel-1.19.2-4mdk.i586.rpm
7.1/SRPMS/gpm-1.19.2-4mdk.src.rpm
For Red Hat:
sparc: ftp://updates.redhat.com/5.2/sparc/gpm-1.19.3-0.5.x.sparc.rpm
alpha: ftp://updates.redhat.com/5.2/alpha/gpm-1.19.3-0.5.x.alpha.rpm
i386: ftp://updates.redhat.com/5.2/i386/gpm-1.19.3-0.5.x.i386.rpm
sources: ftp://updates.redhat.com/5.2/SRPMS/gpm-1.19.3-0.5.x.src.rpm
sparc: ftp://updates.redhat.com/6.2/sparc/gpm-1.19.3-0.6.x.sparc.rpm
i386: ftp://updates.redhat.com/6.2/i386/gpm-1.19.3-0.6.x.i386.rpm
alpha: ftp://updates.redhat.com/6.2/alpha/gpm-1.19.3-0.6.x.alpha.rpm
sources: ftp://updates.redhat.com/6.2/SRPMS/gpm-1.19.3-0.6.x.src.rpm
SuSE Linux ships a slightly older version of gpm because of some
grief with the latest versions. The vulnerabilities in gpm have
been addressed to the fully necessary extent back in April 5. As
mentioned above, there is no pam_console module that could change
the ownerships of the gpm control socket /dev/gpmctl. By
consequence, a local denial of service attack against gpm is
possible. However, SuSE believes that the most effective measure
against this is userdel(8), since hogging disk space/performance,
CPU, bandwidth etc is still possible in the wild even with
appropriate permissions on the gpm socket.