Category
Security
Release Phase
Resolved
ProductSolaris 10 Operating System
Bug Id
6247143
Date of Resolved Release31-JAN-2006
Impact
A security vulnerability in Solaris 10 x64 kernel processing may allow a local unprivileged user the ability to cause a system panic, creating a Denial of Service (DoS) condition.
Contributing Factors
This issue can occur in the following release:
x86 Platform
- Solaris 10 without patch 118844-14
Note: This issue only affects x64 platforms when running in 64-bit mode. SPARC and 32-bit x86 platforms are not affected. Solaris 8 and Solaris 9 do not have support for the x64 architecture and thus are not affected by this issue.
To determine if a system is running in 64-bit mode, the following command can be run:
$ isainfo -b
64
If "64" is returned, the system is running in 64-bit mode.
Symptoms
If the described issue occurs, the system will panic and a message similar to the following will be seen on the console:
panic[cpu3]/thread=ffffffff8e6ab880: bad_set_user_regs: rp=fffffe8008708f10 rp->r_cs=0;
Workaround
To workaround the described issue, boot the system in 32-bit mode.
To specify the 32-bit kernel, as root or with equivalent privileges, enter the following command:
# eeprom boot-file=kernel/unix
Upon the next reboot, the system will be running the 32-bit kernel.
Once the patch for this issue is installed, to reinstate 64 bit mode, as root or with equivalent privileges, enter the following command:
# eeprom boot-file=kernel/amd64/unix
Upon the next reboot, the system will be running the 64-bit kernel.
Resolution
This issue is addressed in the following release:
x86 Platform
- Solaris 10 with patch 118844-14 or later
References
118844-14
AttachmentsThis solution has no attachment