A Security Vulnerability in the Solaris Socket(3SOCKET) Function May Allow Unprivileged Users to Panic the System

Due to a security vulnerability in the socket(3SOCKET) function, Solaris systems without InfiniBand hardware, may allow an unprivileged local user to panic the system and thereby cause a denial of service (DoS).

Document Audience: PUBLIC
Document ID: 242806
Title: A Security Vulnerability in the Solaris Socket(3SOCKET) Function May Allow Unprivileged Users to Panic the System
Copyright Notice: Copyright 2008 Sun Microsystems, Inc. All Rights Reserved
Update Date: Thu Nov 13 00:00:00 MST 2008

Solution TypeSun Alert

Solution 242806 : A Security Vulnerability in the Solaris Socket(3SOCKET) Function May Allow Unprivileged Users to Panic the System


Bug ID
6708602
Product
Solaris 10 Operating System  OpenSolaris

Date of Resolved Release
13-Nov-2008
SA Document Body
Security vulnerability in the Solaris socket(3SOCKET) function:
1. Impact

Due to a security vulnerability in the socket(3SOCKET) function, Solaris systems without InfiniBand hardware, may allow an unprivileged local user to panic the system and thereby cause a denial of service (DoS).

2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform
  • Solaris 10 with patch 127127-11 and without patch 137137-05
  • OpenSolaris based upon builds snv_57 through snv_91
x86 Platform
  • Solaris 10 with patch 127128-11 and without patch 137138-05
  • OpenSolaris based upon builds snv_57 through snv_91
Note 1: Note: Solaris 8 and Solaris 9 are not impacted by this issue.
Note 2: This issue only occurs on systems which do NOT have InfiniBand hardware.

To determine if a system has InfiniBand hardware installed, execute the following command:
 # prtconf -D | egrep '(tavor|arbel|hermon)'
If a system has InfiniBand hardware, the output of the above command will be similar to the following:
    pci15b3,5a44, instance #0 (driver name: tavor)

 Note 3: OpenSolaris distributions may include   additional bug fixes above and beyond the build from which it was   derived.

To determine the base build of OpenSolaris, the following command can be used:
    $ uname -v
snv_86
3. Symptoms

If this issue is exploited to cause a denial of service (DoS), the kernel panics with a stack trace similar to the following:
    panic[cpu1]/thread=fffffffecbd65020: 
recursive mutex_enter, lp=ffffffff0fb28d50 owner=fffffffecbd65020 thread=fffffff
ecbd65020
    ffffff0004ddcc70 unix:mutex_panic+73 ()
ffffff0004ddcce0 unix:mutex_vector_enter+1a9 ()
ffffff0004ddcd50 sockfs:socksdpv_close+143 ()
ffffff0004ddcdc0 genunix:fop_close+64 ()
ffffff0004ddce00 genunix:closef+56 ()
ffffff0004ddcea0 genunix:closeandsetf+458 ()
ffffff0004ddcec0 genunix:close+14 ()
ffffff0004ddcf10 unix:brand_sys_syscall32+1a3 ()
The key identifying features of the panic is the "recursive mutex_enter" message and the presence of
"socksdpv_close()" in the stack trace.

4. Workaround

There is no workaround to this issue. Please see the Resolution section below.

Note: Backing out the affected patches to resolve this issue is not advised since these kernel patches deliver many other security fixes that are required to protect your system.

5. Resolution

This issue is resolved in the following releases:

SPARC Platform
  • Solaris 10 with patch 137137-05 or later
  • OpenSolaris based upon builds snv_92 or later
x86 Platform
  • Solaris 10 with patch 137138-05 or later
  • OpenSolaris based upon builds snv_92 or later
For more information on Security Sun Alerts, see Technical Instruction ID 213557 .

This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements.

Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
Telegram "SecurityLab" Telegram, .