Category
Security
Release Phase
Resolved
ProductSolaris 9 Operating System
Solaris 7 Operating System
Solaris 8 Operating System
Bug Id
4857394
Date of Resolved Release22-JUN-2004
Impact
Local unprivileged users may be able to panic Solaris systems with Basic Security Module (BSM) enabled causing a Denial of Service (DoS). This issue can only occur on systems where BSM has been configured to audit the Administrative audit class "ad" or the System-Wide Administration audit class "as".
Contributing Factors
This issue can occur in the following releases:
SPARC Platform
-
Solaris 7 without patch 106541-33
-
Solaris 8 without patch 109007-18
-
Solaris 9 without patch 114332-12
x86 Platform
-
Solaris 7 without patch 106542-33
-
Solaris 8 without patch 109008-18
-
Solaris 9 without patch 116558-01
Note: This issue can only occur on systems with BSM configured to audit either the Administrative audit class "ad" or the System-Wide Administration audit class "as".
If a Solaris system has BSM enabled, the following line will be present in the "/etc/system" file:
$ grep c2audit /etc/system
set c2audit:audit_load = 1
To determine if either the Administrative audit class or the System-Wide Administration audit class is configured to be audited, the "flags" line of the "/etc/security/audit_control" file will contain either "ad" or "as":
# egrep ^flags:.*a[sd] /etc/security/audit_control
flags:lo,ad
Symptoms
The system panics with a stack trace similar to the following:
pcache_poll+0x98(0, 30005437bc8, 25, 2a100aebaec, 1, 20)
poll+0x3e0(ffbfaa60, 1, 300053f7ef0, 1388, 0, 18)
syscall_trap32+0xa8(ffbfaa60, 3, 1388, 0, 1388, 0)
Workaround
There is no workaround. Please see the "Resolution" section below.
Resolution
This issue is addressed in the following releases:
SPARC Platform
-
Solaris 7 with patch 106541-33 or later
-
Solaris 8 with patch 109007-18 or later
-
Solaris 9 with patch 114332-12 or later
x86 Platform
-
Solaris 7 with patch 106542-33 or later
-
Solaris 8 with patch 109008-18 or later
-
Solaris 9 with patch 116558-01 or later
Modification History
References
109007-18
109008-18
106541-33
106542-33
114332-12
116558-01
AttachmentsThis solution has no attachment