https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
Do we have a fix in 5.*?
Will you make an patch for unsupported 4.*?
Do we have a fix in 5.*?
Will you make an patch for unsupported 4.*?
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
Do we have a fix in 5.*?
Will you make an patch for unsupported 4.*?
FYI one should run pve-kernel-4.15.18-16-pve in version 4.15.18-41 or later for the in Kernel mitigations.
Do we need to apply patches for each VM and container on our system?
One question tho: if a KVM mashine is attacked directly by its ip, will the host crash? As it just forwards the packages via bridge my understanding is that it should be fine. Is this correct?
Acutally im not asking this for proxmox but more for any router in a datacenter. They tend not to accept tcp connections directly, but only forward them.
With the kernel update on the Proxmox Ve Host the PVE Host and all containers are secured against this.
For VMs you need to pull in the respective kernel updates of the Linux Distribution inside the VM. Most a bit more popular Distros have updates ready since circa Tuesday.
A Firewall rule can also be applied which throws a way all segmented TCP packets with very low size, see:
https://forum.proxmox.com/threads/proxmox-and-sack-attack.55257/
according to the Ubuntu wiki, there's no kernel patch for `CVE-2019-11479` -- which is the least serious vulnerability. https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
if I have a container with ubuntu OS in it how proxmox protects us and how each of the three CVE numbers (for linux) are affected?
if I have a container with ubuntu OS in it how proxmox protects us and how each of the three CVE numbers (for linux) are affected?
As a note:
Details:
USN-4017-1 fixed vulnerabilities in the Linux kernel for Ubuntu.
Unfortunately, the update introduced a regression that interfered with
networking applications that setup very low SO_SNDBUF values. This
update fixes the problem.
So the current kernel 4.15.18-41 is still not fully patched.
Please link such information and not just copy the text, though we are tracking this of course and are aware. It's not overlooked and on our radar.
FYI: should have been fixed with: https://git.proxmox.com/?p=pve-kernel.git;a=commitdiff;h=6ba8c6bc5d083be3dc054db38531b28393c4f92fUSN-4017-1 fixed vulnerabilities in the Linux kernel for Ubuntu.
Unfortunately, the update introduced a regression that interfered with
networking applications that setup very low SO_SNDBUF values. This
update fixes the problem.