3 thoughts on “New update available

  1. OMV 3.096.
    The highlight on the main menu is removed when ever a sub-menu is selected.
    This makes it difficult to determine where you have been on the main menu…

  2. Is there a way to secure openmediavault for spectre?
    Meltdown seems already patched.

    Spectre and Meltdown mitigation detection tool v0.20

    Checking for vulnerabilities against live running kernel Linux 4.9.0-0.bpo.5-amd64 #1 SMP Debian 4.9.65-3+deb9u2~bpo8+1 (2017-01-05) x86_64
    Will use vmlinux image /boot/vmlinuz-4.9.0-0.bpo.5-amd64
    Will use kconfig /boot/config-4.9.0-0.bpo.5-amd64
    Will use System.map file /proc/kallsyms

    CVE-2017-5753 [bounds check bypass] aka ‘Spectre Variant 1’
    * Checking count of LFENCE opcodes in kernel: NO (only 39 opcodes found, should be >= 70)
    > STATUS: VULNERABLE (heuristic to be improved when official patches become available)

    CVE-2017-5715 [branch target injection] aka ‘Spectre Variant 2’
    * Mitigation 1
    * Hardware (CPU microcode) support for mitigation: NO
    * Kernel support for IBRS: NO
    * IBRS enabled for Kernel space: NO
    * IBRS enabled for User space: NO
    * Mitigation 2
    * Kernel compiled with retpoline option: NO
    * Kernel compiled with a retpoline-aware compiler: NO
    > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)

    CVE-2017-5754 [rogue data cache load] aka ‘Meltdown’ aka ‘Variant 3’
    * Kernel supports Page Table Isolation (PTI): YES
    * PTI enabled and active: YES
    > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)

Leave a Comment