Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   Solaris Vendors:   Sun
Solaris Floating Point Context Switch Bug Lets Local Users Deny Service
SecurityTracker Alert ID:  1019833
SecurityTracker URL:
CVE Reference:   CVE-2008-1778   (Links to External Site)
Updated:  Apr 17 2008
Original Entry Date:  Apr 11 2008
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9, 10
Description:   A vulnerability was reported in Solaris. A local user can cause denial of service conditions.

A local user can exploit a flaw in the Floating Point Context Switch implementation to cause an application on the target system to crash or obtain incorrect results from a floating point operation. The user cannot select which application will crash.

Applications executing floating point operations may get incorrect results.

On Solaris 10, applications using the libc(3LIB) functions memcpy(3C), memset(3C), or memmove(3C) may get incorrect results.

Impact:   A local user can cause floating point calculation errors.
Solution:   The vendor has issued the following fix.

x86 Platform

* Solaris 9 with patch 122301-23 or later
* Solaris 10 with patch 127112-10 or later

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC