Note: This is an archival copy of Security Sun Alert 200460 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000340.1.
Solaris 10 Operating System
Date of Resolved Release
A security vulnerability in Solaris 10 x64 kernel processing may allow a local unprivileged user the ability to cause a system panic, creating a Denial of Service (DoS) condition.
This issue can occur in the following release:
Note: This issue only affects x64 platforms when running in 64-bit mode. SPARC and 32-bit x86 platforms are not affected. Solaris 8 and Solaris 9 do not have support for the x64 architecture and thus are not affected by this issue.
To determine if a system is running in 64-bit mode, the following command can be run:
$ isainfo -b 64
If "64" is returned, the system is running in 64-bit mode.
If the described issue occurs, the system will panic and a message similar to the following will be seen on the console:
panic[cpu3]/thread=ffffffff8e6ab880: bad_set_user_regs: rp=fffffe8008708f10 rp->r_cs=0;
To workaround the described issue, boot the system in 32-bit mode.
To specify the 32-bit kernel, as root or with equivalent privileges, enter the following command:
# eeprom boot-file=kernel/unix
Upon the next reboot, the system will be running the 32-bit kernel.
Once the patch for this issue is installed, to reinstate 64 bit mode, as root or with equivalent privileges, enter the following command:
# eeprom boot-file=kernel/amd64/unix
Upon the next reboot, the system will be running the 64-bit kernel.
This issue is addressed in the following release:
This solution has no attachment