Note: This is an archival copy of Security Sun Alert 274830 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1021744.1.
Article ID : 1021744.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2010-01-04
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerability May Prevent OpenSolaris "hald" Daemon From Correctly Writing Audit Records



Category
Security

Release Phase
Resolved

Bug Id
6905945

Product
OpenSolaris

Date of Resolved Release
05-Jan-2010

A security vulnerability in the OpenSolaris hald(1M) daemon ...

1. Impact

A security vulnerability in the OpenSolaris hald(1M) daemon may result in it not writing audit
records when the system is configured to do so.



2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform

  • OpenSolaris based upon builds snv_51 through snv_130

x86 Platform

  • OpenSolaris based upon builds snv_51 through snv_130

Note 1: This issue only affects systems which have Solaris Auditing
enabled (see bsmconv(1M)). To determine if a system has Solaris
Auditing enabled the grep(1) command can be used to search the
'/etc/system' file for a reference to the c2audit kernel module as in
the following example:

            $ grep c2audit /etc/system
set c2audit:audit_load = 1

Note 2: Solaris 8, 9 and 10 do not include the hald daemon and are therefore
not impacted by this issue.

Note 3: This issue only affects hosts which have the hald daemon enabled.
To determine if hald daemon is enabled in system, the following command can be used:

    $ svcs hal
    STATE STIME FMRI
    online 10:08:43 svc:/system/hal:default

Note 4: OpenSolaris distributions may include additional bug fixes
above and beyond the build from which it was derived. To determine the
base build of OpenSolaris, the following command can be used:

            $ uname -v
snv_86


3. Symptoms

When this issue occurs, audit records related to the hald daemon are
not written to the auditing log. If the "priv_debug" parameter is set
in the /etc/system file at boot time, then a message similar to the
following may appear in the messages file:

  	NOTICE: hald[100323]: missing privilege "proc_audit" (euid = 0,
syscall = 186) needed at auditctl+0x58

4. Workaround

There is no workaround for this issue. Please see Resolution section below.


5. Resolution

This issue is addressed in the following releases:

SPARC Platform

  • OpenSolaris based upon builds snv_131 or later

x86 Platform

  • OpenSolaris based upon builds snv_131 or later

This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements.

Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.











Attachments
This solution has no attachment