Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0142 -- [Solaris] Certain Solaris 9 st(7D) Driver Patches may Cause a System Panic 11 February 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: st(7D) Publisher: Sun Microsystems Operating System: Solaris Impact: Denial of Service Access: Existing Account Original Bulletin: http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-200843-1 - --------------------------BEGIN INCLUDED TEXT-------------------- Solution Type: Sun Alert Solution 200843 : Certain Solaris 9 st(7D) Driver Patches may Cause a System Panic Previously Published As: 103190 Product Solaris 9 Operating System Bug ID: 6640814 Date of Workaround Release: 21-DEC-2007 Date of Resolved Release: 22-Jan-2008 SA Document Body Solaris 9 systems with certain st(7D) patches installed may panic (see below fo r full details) Impact Solaris 9 systems with certain st(7D) patches installed may panic when sending SCSI commands to tape drives that are in the process of carrying out erase, rewind, or locate operations. Contributing Factors This issue may occur in the following releases: SPARC Platform * Solaris 9 with patches 113277-54-1">113277-54 through 113277-56-1">113277-56 and without patch 113277-57-1">113277-57 X86 Platform * Solaris 9 with patches 114243-18-1">114243-18 through 114243-19-1">114243-19 and without patch 114243-20-1">114243-20 Note: Solaris 8 and Solaris 10 are not impacted by this issue. Symptoms On systems with the affected st(7D) driver patches listed in section 2 above, the following panic message may be seen on the console after the system sends SCSI commands to tape drives that are currently performing erase, rewind or locate operations: panic[cpu16]/thread=2a100597d40: BAD TRAP: type=31 rp=2a100597700 addr=12dc b9d50 mmu_fsr=0 sched: trap type = 0x31 addr=0x12dcb9d50 pid=0, pc=0x13f44a0, sp=0x2a100596fa1, tstate=0x9980001607, context=0x0 g1-g7: 14d1000, 12c7e8c00, 14d1150, 0, 14d2d77, 0, 2a100597d40 000002a100597420 unix:die+a4 (31, 2a100597700, 12dcb9d50, 0, 0, 14d2d60) %l0-3: 0000000000000000 000000012c7e8c00 000002a100597700 000002a1005975 f0 %l4-7: 0000000000000031 000000000142e6f8 0000000000000000 000002a10000b9 50 000002a100597500 unix:trap+8e4 (2a100597700, 0, 10000, 10200, 1, 0) %l0-3: 0000000000000001 0000000000000000 00000000014387d8 00000000000000 31 %l4-7: 0000000000000005 0000000000000001 0000000000000000 00000000000000 00 000002a100597650 unix:ktl0+48 (14d2d77, 14d2d78, 65616400, 7efefeff, 810101 00, ff00) %l0-3: 0000000000000000 0000000000001400 0000009980001607 000000000102db 18 %l4-7: 0000030007c51218 0000000000000000 0000000000000004 000002a1005977 00 000002a1005977a0 scsi:scsi_vu_errmsg+a0 (0, 14d2d60, 3, 14d06f0, 0, 8) %l0-3: 0000000000000013 00000000014d2fa0 000003003c7d4940 000003000ed46d 10 %l4-7: 00000000780a21c8 00000300231f6e80 0000000000000003 00000000258fd1 80 000002a100597850 scsi:scsi_errmsg+30 (300231f6e80, 300258a2800, 780a21c8, 2 58fd180, 3, 3) %l0-3: 0000030008aa6c20 000000000000ff00 0000000000000000 00000000002000 00 %l4-7: 0000000000000008 00000300082941b8 0000000000000000 0000030007cad2 70 000002a100597920 st:st_decode_sense+b44 (780a2000, 3000a89eee8, 14, 300258a 2fa9, 0, 0) %l0-3: 0000000000000400 0000000000000003 00000300258fd180 000003003c7d49 40 %l4-7: 0000030024ef3388 000003000a89eee8 00000300258a2800 00000000780a20 20 000002a1005979e0 st:st_intr+e0 (300258a2800, 2a100597d40, 20, 0, 30007caa00 0, 0) %l0-3: 000000000000025f 000003000a89eee8 0000030024ef3388 00000000000000 00 %l4-7: 0000000000000000 0000000000000000 0000000000000000 00000000000000 00 000002a100597a90 lpfc:lpfc_deferred_fcp_processing+68 (30007cad000, 807, 30 007cad000, 300002cbdc8, 300258a2860, 7845099c) %l0-3: 0000000078513920 0000030007a49178 0000000000000001 00000000000000 01 %l4-7: 0000030000083908 0000000000000000 00000000781f6000 00000000781f64 00 syncing file systems... 7 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 done (not all i/o completed) dumping to /dev/dsk/c1t0d0s1, offset 65536, content: kernel Workaround To work around this issue, do not install the affected patches listed in section 2 above. If these patches are installed, back them out using the patchrm(1M) command. Resolution This issue is addressed in the following releases: Sparc Platform * Solaris 9 without patch 113277-57-1">113277-57 or later x86 Platform * Solaris 9 without patch 114243-20-1">114243-20 or later This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR6/Lsih9+71yA2DNAQKgSQP/UDGzPCz69pR/0geKzu4h0StdjosbTP7R ElPWH+5vkqCwdWxv6jNO1/sqPsb1Bv/GJTc7jEOcSYUZU7v0szKCS3WJbmfIgWAq 5dI8QYgR297/kAnM2PN8iS86P2wFcjviy3iTuOu5JyljErx5RekKKSOH31Z6iivN /Emrc54yTlk= =sPGW -----END PGP SIGNATURE-----