[FIXED 6.1.9] [PENDING UPSTEAM FIX] Kernel Vulnerability CVE-2016-0728


NAS

Recommended Posts

 

I saw this report myself last night.  Just came here to search for it...

 

NAS, you're quick....  ;D

 

Thanks, its my day job.

 

I actively try to only post the bare minimum most important vulnerabilities here as it is easy to get carried away. So far the security patching burden in unRAID has been extremely low and with a couple of notable exceptions turn around these days is reasonably good.

 

Long may it continue, i know I appreciate it.

Link to comment

It seems that all over the internet, devs are having problems proving or disproving this CVE in real life and there is a worrying trend of PEBKAC and Chinese whispers becoming fact. i.e. nonsense e like "I cant blindly use the  POC therefore the CVE isnt valid".

 

How are we handling this, if/when are we patching it?

 

Edit: I meant to say that there is a valid case for arguing that due to unRAIDs flatter security model we may not need to rush this out but I think we do need an open debate or at least some more timely feedback.

Link to comment

It seems that all over the internet, devs are having problems proving or disproving this CVE in real life and there is a worrying trend of PEBKAC and Chinese whispers becoming fact. i.e. nonsense e like "I cant blindly use the  POC therefore the CVE isnt valid".

 

How are we handling this, if/when are we patching it?

 

Edit: I meant to say that there is a valid case for arguing that due to unRAIDs flatter security model we may not need to rush this out but I think we do need an open debate or at least some more timely feedback.

 

There was a patch submitted upstream for the fix by someone, but until it's merged, we're not touching it.  The Linux kernel/dev team has a process for merging patches like these through mainline, then they backport to stable.  We will follow suit.

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.