From owner-freebsd-security@FreeBSD.ORG Fri Nov 23 00:40:48 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 971F8FAB for ; Fri, 23 Nov 2012 00:40:48 +0000 (UTC) (envelope-from bryan-lists@shatow.net) Received: from secure.xzibition.com (secure.xzibition.com [173.160.118.92]) by mx1.freebsd.org (Postfix) with ESMTP id 38FA58FC13 for ; Fri, 23 Nov 2012 00:40:47 +0000 (UTC) DomainKey-Signature: a=rsa-sha1; c=nofws; d=shatow.net; h=message-id :date:from:mime-version:to:subject:references:in-reply-to :content-type:content-transfer-encoding; q=dns; s=sweb; b=UTcOOJ ysELox3qpymhiUyiCqV713DwjwQ4w1f7B2KqAcCLamg6qvgShZ6RVA9YWPSjPlml kkLKVkbgAHCUAijSN6hNhMU3Pst3vL6eo3oP9eMOOGDRNxQ1Ad89UHhd1wuNTB6/ P+4w4nyJUWrg033mNWF3RtNHdRWOIv/aGZi/I= DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=shatow.net; h=message-id :date:from:mime-version:to:subject:references:in-reply-to :content-type:content-transfer-encoding; s=sweb; bh=QllFEFQNpEFp oIb2YZJz3dKnYaxRWmTwjzATlJjzQII=; b=BDypNzqZQ6OKdr5kzp/kb2eAfIbg dvSWPATdGR2O81u7JFgb3mO8aGvgc0vFQsWtupsfyOjNRvIfGvHMvu/XdnkSdnrb hD6vQkDwuJbwS3AKZFMuTPl6/IpWvRbvXRLJjHfWs7smaxu8i7zxbqe50nnNYrig vlNRhVoVXSfh6y0= Received: (qmail 4873 invoked from network); 22 Nov 2012 18:40:46 -0600 Received: from unknown (HELO ?10.10.0.115?) (bryan@shatow.net@10.10.0.115) by sweb.xzibition.com with ESMTPA; 22 Nov 2012 18:40:46 -0600 Message-ID: <50AEC609.2040102@shatow.net> Date: Thu, 22 Nov 2012 18:40:41 -0600 From: Bryan Drewery User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/17.0 Thunderbird/17.0 MIME-Version: 1.0 To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-12:08.linux References: <201211230002.qAN023hw018318@freefall.freebsd.org> <50AEC391.9020105@shatow.net> In-Reply-To: <50AEC391.9020105@shatow.net> X-Enigmail-Version: 1.4.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Nov 2012 00:40:48 -0000 On 11/22/2012 6:30 PM, Bryan Drewery wrote: > On 11/22/2012 6:02 PM, FreeBSD Security Advisories wrote: >> IV. Workaround >> >> No workaround is available, but systems not using the Linux binary >> compatibility layer are not vulnerable. >> >> The following command can be used to test if the Linux binary >> compatibility layer is loaded: >> >> # kldstat -m linuxelf > > Is it sufficient to kldunload linux? > > Bryan Assuming it is enough to unload[/recompile/reload], here's a tip if it refuses to unload (in use), assuming no securelevel: > # kldunload linux > kldunload: can't unload file: Device busy > # procstat -ka|grep linux > 40338 100221 bot - mi_switch sleepq_switch sleepq_catch_signals sleepq_timedwait_sig _cv_timedwait_sig kern_select linux_select syscall Xint0x80_syscall > # kill 40338 > # kldunload linux > # kldstat -m linuxelf > kldstat: can't find module linuxelf: No such file or directory -- Regards, Bryan Drewery bdrewery@freenode/EFNet