Note: This is an archival copy of Security Sun Alert 242806 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1019643.1.
Article ID : 1019643.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2008-11-12
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

A Security Vulnerability in the Solaris Socket(3SOCKET) Function May Allow Unprivileged Users to Panic the System



Category
Security

Release Phase
Resolved

Bug Id
6708602

Product
Solaris 10 Operating System
OpenSolaris

Date of Resolved Release
13-Nov-2008

Security vulnerability in the Solaris socket(3SOCKET) function:

1. Impact

Due to a security vulnerability in the socket(3SOCKET) function, Solaris systems without InfiniBand hardware, may allow an unprivileged local user to panic the system and thereby cause a denial of service (DoS).

2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform
  • Solaris 10 with patch 127127-11 and without patch 137137-05
  • OpenSolaris based upon builds snv_57 through  snv_91
x86 Platform
  • Solaris 10 with patch 127128-11 and without patch 137138-05
  • OpenSolaris based upon builds snv_57 through  snv_91
Note 1: Note: Solaris 8 and Solaris 9 are not impacted by this issue.
Note 2: This issue only occurs on systems which do NOT have InfiniBand hardware.

To determine if a system has InfiniBand hardware installed, execute the following command:
    # prtconf -D | egrep '(tavor|arbel|hermon)'
If  a system has InfiniBand hardware, the output of the above command will be similar to the following:
    pci15b3,5a44, instance #0 (driver name: tavor)
Note 3: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived.

To determine the base build of  OpenSolaris, the following command can be used:
    $ uname -v
snv_86
3. Symptoms

If this issue is exploited to cause a denial of service (DoS), the kernel panics with a stack trace similar to the following:
    panic[cpu1]/thread=fffffffecbd65020: 
recursive mutex_enter, lp=ffffffff0fb28d50 owner=fffffffecbd65020 thread=fffffff
ecbd65020
    ffffff0004ddcc70 unix:mutex_panic+73 ()
ffffff0004ddcce0 unix:mutex_vector_enter+1a9 ()
ffffff0004ddcd50 sockfs:socksdpv_close+143 ()
ffffff0004ddcdc0 genunix:fop_close+64 ()
ffffff0004ddce00 genunix:closef+56 ()
ffffff0004ddcea0 genunix:closeandsetf+458 ()
ffffff0004ddcec0 genunix:close+14 ()
ffffff0004ddcf10 unix:brand_sys_syscall32+1a3 ()
The key identifying features of the panic is the "recursive mutex_enter" message and the presence of
"socksdpv_close()" in the stack trace.

4. Workaround

There is no workaround to this issue. Please see the Resolution section below.

Note: Backing out the affected patches to resolve this issue is not advised since these kernel patches deliver many other security fixes that are required to protect your system.

5. Resolution

This issue is resolved in the following releases:

SPARC Platform
  • Solaris 10 with patch 137137-05 or later
  • OpenSolaris based upon builds snv_92 or later
x86 Platform
  • Solaris 10 with patch 137138-05 or later
  • OpenSolaris based upon builds snv_92 or later
For more information on Security Sun Alerts, see 1009886.1.

This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements.

Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.


References

137137-05
137138-05





Attachments
This solution has no attachment