Bonjour Cédric,

We can't; you must do it yourself by sending an email (even a blank one) to:

freebsd-security+unsubscr...@freebsd.org



----------------------------------------

2024-04-07T11:57:04Z Cédric Weis <ha...@free.fr>:

> Unsubscribe me please. I don't know how to to it by myself.
> 
> Le 07/04/2024 11:35, « Chen, Alvin W » <owner-freebsd-security@freebsdorg 
> <mailto:owner-freebsd-secur...@freebsd.org> au nom de weike.c...@dell.com 
> <mailto:weike.c...@dell.com>> a écrit :
> 
> 
>>>> All supported FreeBSD releases include versions of xz that predate the
>> affected releases.
>>>> 
>>>> The main, stable/14, and stable/13 branches do include the affected version
>> (5.6.0), but the backdoor components were excluded from the vendor import.
>> Additionally, FreeBSD does not use the upstream's build tooling, which was a
>> required part of the attack. Lastly, the attack specifically targeted x86_64 
>> Linux
>> systems using glibc.
>>> 
>>> Hey Gordon,
>>> 
>>> Is there potential for Linux jails on FreeBSD systems (ie, deployments
>>> making use of the Linxulator) to be impacted? Assuming amd64 here,
>>> too.
>> 
>> Hard to say for certain, but I suspect the answer is yes. If the jail has the
>> vulnerable software installed, there is a decent chance it would be 
>> affected. At
>> that point, I would refer to the vulnerability statement published by the 
>> Linux
>> distro the jail is based on. I don’t believe the vulnerability has any kernel
>> dependencies that FreeBSD would provide protection.
>> 
>> Certainly, in the world of being conservatively cautious, I would immediately
>> address any such Linux jails.
>> 
>> Gordon
> My understanding is: the 'xz' built from FreeBSD is not impacted, but the 
> 'xz' built from Linux and run based on FreeBSD Linux ABI could be impacted.
> Please correct my if I am wrong.
> 
> 
> Internal Use - Confidential

Reply via email to