Is Scale Affected by Dirty Pipe Exploit?

jgreco

Resident Grinch
Joined
May 29, 2011
Messages
18,680
How would it be "already patched"?

It isn't really a problem unless you're letting users log directly onto your server and get a shell. Which is always a bad idea.
 

HarryMuscle

Contributor
Joined
Nov 15, 2021
Messages
161
How would it be "already patched"?

It isn't really a problem unless you're letting users log directly onto your server and get a shell. Which is always a bad idea.
The kernel was patched last month before this exploit was made public so depending which kernel version is being used in the release version of Scale it could already be patched.

Thanks,
Harry
 
Joined
Jun 2, 2019
Messages
591
According to BC

While the bug has been fixed in Linux kernels 5.16.11, 5.15.25, and 5.10.102, many servers continue to run outdated kernels making the release of this exploit a significant issue to server administrators.


Current SCALE Angelfish release and Bluefin nightlies are using 5.10.93, so unless you need it, disable SSH

root@NAS-3[~]# uname -a
Linux NAS-3 5.10.93+truenas #1 SMP Wed Feb 23 14:35:55 UTC 2022 x86_64 GNU/Linux
root@NAS-3[~]#
 
Last edited:
Joined
Jun 2, 2019
Messages
591
Latest nightlies are running newer kernel.


TrueNAS-SCALE-22.12-MASTER-20220310-132924

Code:
root@NAS-3[~]# uname -a
Linux NAS-3 5.10.103+truenas #1 SMP Tue Mar 8 20:31:49 UTC 2022 x86_64 GNU/Linux
 
Top