Category
Security
Release Phase
Resolved
Bug Id
6708602
ProductSolaris 10 Operating System
OpenSolaris
Date of Resolved Release13-Nov-2008
Security vulnerability in the Solaris socket(3SOCKET) function:
1. Impact
Due to a security vulnerability in the socket(3SOCKET) function,
Solaris systems without InfiniBand hardware, may allow an unprivileged
local user to panic the system and thereby cause a denial of service
(DoS).
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform
- Solaris 10 with patch 127127-11 and without patch 137137-05
- OpenSolaris based upon builds snv_57 through snv_91
x86 Platform
- Solaris 10 with patch 127128-11 and without patch 137138-05
- OpenSolaris based upon builds snv_57 through snv_91
Note 1: Note: Solaris 8 and
Solaris 9 are not impacted by this issue.
Note 2: This issue only occurs
on systems which do NOT have InfiniBand hardware.
To determine if a system has InfiniBand hardware installed, execute the
following command:
# prtconf -D | egrep '(tavor|arbel|hermon)'
If a system has InfiniBand hardware, the output of the above
command will be similar to the following:
pci15b3,5a44, instance #0 (driver name: tavor)
Note 3: OpenSolaris
distributions may include additional bug fixes above and beyond the
build from which it was derived.
To determine the base build of OpenSolaris, the following command
can be used:
$ uname -v
snv_86
3. Symptoms
If this issue is exploited to cause a denial of service (DoS), the
kernel panics with a stack trace similar to the following:
panic[cpu1]/thread=fffffffecbd65020:
recursive mutex_enter, lp=ffffffff0fb28d50 owner=fffffffecbd65020 thread=fffffff
ecbd65020
ffffff0004ddcc70 unix:mutex_panic+73 ()
ffffff0004ddcce0 unix:mutex_vector_enter+1a9 ()
ffffff0004ddcd50 sockfs:socksdpv_close+143 ()
ffffff0004ddcdc0 genunix:fop_close+64 ()
ffffff0004ddce00 genunix:closef+56 ()
ffffff0004ddcea0 genunix:closeandsetf+458 ()
ffffff0004ddcec0 genunix:close+14 ()
ffffff0004ddcf10 unix:brand_sys_syscall32+1a3 ()
The key identifying features of the panic is the "recursive
mutex_enter" message and the presence of
"socksdpv_close()" in the stack trace.
4. Workaround
There is no workaround to this issue. Please see the Resolution section
below.
Note: Backing out the affected
patches to resolve this issue is not advised since these kernel patches
deliver many other security fixes that are required to protect your
system.
5. Resolution
This issue is resolved in the following releases:
SPARC Platform
- Solaris 10 with patch 137137-05 or later
- OpenSolaris based upon builds snv_92 or later
x86 Platform
- Solaris 10 with patch 137138-05 or later
- OpenSolaris based upon builds snv_92 or later
For more information
on Security Sun Alerts, see 1009886.1.
This Sun Alert notification is being provided to you on
an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU
ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT
OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This
Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle,
Santa
Clara, CA 95054 U.S.A. All rights reserved.References
137137-05
137138-05
AttachmentsThis solution has no attachment