Note: This is an archival copy of Security Sun Alert 228525 as previously published on
Latest version of this security advisory is available from as Sun Alert 1017427.1.
Article ID : 1017427.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2006-08-02
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerabilities in The Solaris Event Port API May Result in a Denial of Service (DoS) Condition


Release Phase

Solaris 10 Operating System

Bug Id
6367349, 6358194, 6357796, 6362390

Date of Resolved Release


Security vulnerabilities in the Solaris event port API may allow a local unprivileged user the ability to run an application which uses the API in such a way as to cause the system to panic, leading to a Denial of Service (DoS) condition.

The Apache server is an example of an application that makes use of the event port API. On a system running Apache2 (Apache/2.2.0) it may be possible for a remote unprivileged user to cause that system to panic, resulting in a Denial of Service (DoS) condition.

Contributing Factors

This issue can occur in the following releases:

SPARC Platform

  • Solaris 10 without patch 118833-12

x86 Platform

  • Solaris 10 without patch 118855-10

Note 1: Solaris 8 and Solaris 9 are not affected by this issue.

Note 2: The Apache 2 web server that is distributed with Solaris 10 in packages SUNWapch2d and SUNWapch2u is not affected by this issue.

To determine if apache is using event port API, the following command can be used:

    # pfiles <httpd pid> | grep S_IFPORT
    14: S_IFPORT mode:0000 dev:301,0 uid:1 gid:12 size:0

Note: <httpd pid> refers to the process id of the apache process.

The above example indicates that the apache process has create an event port, hence this version of apache is vulnerable.

The above command will produce no output on an unaffected system.


If the described issue occurs, the system will panic with a panic stack trace similar to one of the following:




There is no workaround. Please see the "Resolution" section below.


This issue is addressed in the following releases:

SPARC Platform

  • Solaris 10 with patch 118833-12 or later

x86 Platform

  • Solaris 10 with patch 118855-10 or later



This solution has no attachment